* [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-01 14:52 Arnd Bergmann
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
` (5 more replies)
0 siblings, 6 replies; 34+ messages in thread
From: Arnd Bergmann @ 2022-03-01 14:52 UTC (permalink / raw)
To: Masahiro Yamada
Cc: Arnd Bergmann, Linus Torvalds, Marco Elver, Jani Nikula,
David Sterba, Alex Shi, Nick Desaulniers, Miguel Ojeda,
Mark Rutland, linux-kbuild, llvm, linux-doc, linux-kernel
From: Arnd Bergmann <arnd@arndb.de>
During a patch discussion, Linus brought up the option of changing
the C standard version from gnu89 to gnu99, which allows using variable
declaration inside of a for() loop. While the C99, C11 and later standards
introduce many other features, most of these are already available in
gnu89 as GNU extensions as well.
An earlier attempt to do this when gcc-5 started defaulting to
-std=gnu11 failed because at the time that caused warnings about
designated initializers with older compilers. Now that gcc-5.1 is
the minimum compiler version used for building kernels, that is no
longer a concern. Similarly, the behavior of 'inline' functions changes
between gnu89 using gnu_inline behavior and gnu11 using standard c99+
behavior, but this was taken care of by defining 'inline' to include
__attribute__((gnu_inline)) in order to allow building with clang a
while ago.
One minor issue that remains is an added gcc warning for shifts of
negative integers when building with -Wextra, which happens with the
'make W=1' option, as well as for three drivers in the kernel that always
enable -Wextra, but it was only observed with the i915 driver so far.
To be on the safe side, add -Wno-shift-negative-value to any -Wextra
in a Makefile.
Nathan Chancellor reported an additional -Wdeclaration-after-statement
warning that appears in a system header on arm, this still needs a
workaround.
The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
minimal and mainly impact warnings at the -Wpedantic level that the
kernel never enables. Between these, gnu11 is the newest version
that is supported by all supported compiler versions, though it is
only the default on gcc-5, while all other supported versions of
gcc or clang default to gnu1x/gnu17.
Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
Link: https://github.com/ClangBuiltLinux/linux/issues/1603
Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
Acked-by: Marco Elver <elver@google.com>
Acked-by: Jani Nikula <jani.nikula@intel.com>
Acked-by: David Sterba <dsterba@suse.com>
Reviewed-by: Alex Shi <alexs@kernel.org>
Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
Cc: Masahiro Yamada <masahiroy@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: linux-kbuild@vger.kernel.org
Cc: llvm@lists.linux.dev
Cc: linux-doc@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
---
[v3]
- split out USERCFLAGS to a separate patch
- add -Wdeclaration-after-statement patch from Mark Rutland
- leave out C17 reference
- more rewording the descrption
[v2]
- added -std=gnu11 back, rather than just relying on the default
- minor changes to changelog text
---
Documentation/process/programming-language.rst | 6 +++---
.../translations/it_IT/process/programming-language.rst | 4 ++--
.../translations/zh_CN/process/programming-language.rst | 3 +--
.../translations/zh_TW/process/programming-language.rst | 3 +--
Makefile | 4 ++--
arch/arm64/kernel/vdso32/Makefile | 2 +-
drivers/gpu/drm/i915/Makefile | 1 +
drivers/staging/greybus/tools/Makefile | 3 ++-
fs/btrfs/Makefile | 1 +
| 1 +
10 files changed, 15 insertions(+), 13 deletions(-)
diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
index ec474a70a02f..5fc9160ca1fa 100644
--- a/Documentation/process/programming-language.rst
+++ b/Documentation/process/programming-language.rst
@@ -5,9 +5,9 @@ Programming Language
The kernel is written in the C programming language [c-language]_.
More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
-under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
-(including some C99 features). ``clang`` [clang]_ is also supported, see
-docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
+under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
+``clang`` [clang]_ is also supported, see docs on
+:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
This dialect contains many extensions to the language [gnu-extensions]_,
and many of them are used within the kernel as a matter of course.
diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
index 41db2598ce11..c1a9b481a6f9 100644
--- a/Documentation/translations/it_IT/process/programming-language.rst
+++ b/Documentation/translations/it_IT/process/programming-language.rst
@@ -10,8 +10,8 @@ Linguaggio di programmazione
Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
-l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
-dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
+l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
+dello standard ISO C11.
Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
index 2a47a1d2ec20..fabdc338dbfb 100644
--- a/Documentation/translations/zh_CN/process/programming-language.rst
+++ b/Documentation/translations/zh_CN/process/programming-language.rst
@@ -9,8 +9,7 @@
============
内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
-在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
-包括一些C99特性)
+在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
index 54e3699eadf8..144bdaf81a41 100644
--- a/Documentation/translations/zh_TW/process/programming-language.rst
+++ b/Documentation/translations/zh_TW/process/programming-language.rst
@@ -12,8 +12,7 @@
============
內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
-在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
-包括一些C99特性)
+在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
diff --git a/Makefile b/Makefile
index 289ce2be8032..94fa9a849a7a 100644
--- a/Makefile
+++ b/Makefile
@@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
-fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
-Werror=implicit-function-declaration -Werror=implicit-int \
-Werror=return-type -Wno-format-security \
- -std=gnu89
+ -std=gnu11
KBUILD_CPPFLAGS := -D__KERNEL__
KBUILD_AFLAGS_KERNEL :=
KBUILD_CFLAGS_KERNEL :=
@@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
ifdef CONFIG_CC_IS_CLANG
KBUILD_CPPFLAGS += -Qunused-arguments
-# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
+# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
KBUILD_CFLAGS += -Wno-gnu
# CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
# source of a reference will be _MergedGlobals and not on of the whitelisted names.
diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
index 6c01b63ff56d..9378ea055bf2 100644
--- a/arch/arm64/kernel/vdso32/Makefile
+++ b/arch/arm64/kernel/vdso32/Makefile
@@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
-fno-strict-aliasing -fno-common \
-Werror-implicit-function-declaration \
-Wno-format-security \
- -std=gnu89
+ -std=gnu11
VDSO_CFLAGS += -O2
# Some useful compiler-dependent flags from top-level Makefile
VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
index 1b62b9f65196..1618a6e0af4e 100644
--- a/drivers/gpu/drm/i915/Makefile
+++ b/drivers/gpu/drm/i915/Makefile
@@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
subdir-ccflags-y += -Wno-type-limits
subdir-ccflags-y += -Wno-missing-field-initializers
subdir-ccflags-y += -Wno-sign-compare
+subdir-ccflags-y += -Wno-shift-negative-value
subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
subdir-ccflags-y += $(call cc-disable-warning, frame-address)
subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
index ad0ae8053b79..a3bbd73171f2 100644
--- a/drivers/staging/greybus/tools/Makefile
+++ b/drivers/staging/greybus/tools/Makefile
@@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
-Wredundant-decls \
-Wcast-align \
-Wsign-compare \
- -Wno-missing-field-initializers
+ -Wno-missing-field-initializers \
+ -Wno-shift-negative-value
CC := $(CROSS_COMPILE)gcc
diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
index 4188ba3fd8c3..99f9995670ea 100644
--- a/fs/btrfs/Makefile
+++ b/fs/btrfs/Makefile
@@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
subdir-ccflags-y += -Wno-missing-field-initializers
subdir-ccflags-y += -Wno-sign-compare
subdir-ccflags-y += -Wno-type-limits
+subdir-ccflags-y += -Wno-shift-negative-value
obj-$(CONFIG_BTRFS_FS) := btrfs.o
--git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
index 8be892887d71..650d0b8ceec3 100644
--- a/scripts/Makefile.extrawarn
+++ b/scripts/Makefile.extrawarn
@@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
KBUILD_CFLAGS += -Wno-missing-field-initializers
KBUILD_CFLAGS += -Wno-sign-compare
KBUILD_CFLAGS += -Wno-type-limits
+KBUILD_CFLAGS += -Wno-shift-negative-value
KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
--
2.29.2
^ permalink raw reply related [flat|nested] 34+ messages in thread
* [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
@ 2022-03-01 14:52 ` Arnd Bergmann
2022-03-01 16:54 ` Nathan Chancellor
` (3 more replies)
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
` (4 subsequent siblings)
5 siblings, 4 replies; 34+ messages in thread
From: Arnd Bergmann @ 2022-03-01 14:52 UTC (permalink / raw)
To: Masahiro Yamada
Cc: Arnd Bergmann, Linus Torvalds, Marco Elver, Jani Nikula,
David Sterba, Alex Shi, Nick Desaulniers, Miguel Ojeda,
Mark Rutland, linux-kbuild, llvm, linux-doc, linux-kernel
From: Mark Rutland <mark.rutland@arm.com>
In a subsequent patch we'll move the kernel from using `-std=gnu89` to
`-std=gnu11`, permitting the use of additional C11 features such as
for-loop initial declarations.
One contentious aspect of C99 is that it permits mixed declarations and
code, and for now at least, it seems preferable to enforce that
declarations must come first.
These warnings were already disabled in the kernel itself, but not
for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
a separate set of CFLAGS.
This patch fixes an existing violation in modpost.c, which is not
reported because of the missing flag in KBUILD_USERCFLAGS:
| scripts/mod/modpost.c: In function ‘match’:
| scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
| 837 | const char *endp = p + strlen(p) - 1;
| | ^~~~~
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
[arnd: don't add a duplicate flag to the default set, update changelog]
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
---
Makefile | 3 ++-
arch/arm64/kernel/vdso32/Makefile | 1 +
scripts/mod/modpost.c | 4 +++-
3 files changed, 6 insertions(+), 2 deletions(-)
diff --git a/Makefile b/Makefile
index 94fa9a849a7a..37ef6a555dcd 100644
--- a/Makefile
+++ b/Makefile
@@ -432,7 +432,8 @@ HOSTCXX = g++
endif
export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
- -O2 -fomit-frame-pointer -std=gnu89
+ -O2 -fomit-frame-pointer -std=gnu89 \
+ -Wdeclaration-after-statement
export KBUILD_USERLDFLAGS :=
KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
index 9378ea055bf2..ed181bedbffc 100644
--- a/arch/arm64/kernel/vdso32/Makefile
+++ b/arch/arm64/kernel/vdso32/Makefile
@@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
-fno-strict-aliasing -fno-common \
-Werror-implicit-function-declaration \
-Wno-format-security \
+ -Wdeclaration-after-statement \
-std=gnu11
VDSO_CFLAGS += -O2
# Some useful compiler-dependent flags from top-level Makefile
diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
index 6bfa33217914..fe693304b120 100644
--- a/scripts/mod/modpost.c
+++ b/scripts/mod/modpost.c
@@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
{
const char *p;
while (*pat) {
+ const char *endp;
+
p = *pat++;
- const char *endp = p + strlen(p) - 1;
+ endp = p + strlen(p) - 1;
/* "*foo*" */
if (*p == '*' && *endp == '*') {
--
2.29.2
^ permalink raw reply related [flat|nested] 34+ messages in thread
* [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
@ 2022-03-01 14:52 ` Arnd Bergmann
2022-03-01 17:00 ` Nathan Chancellor
` (2 more replies)
2022-03-01 16:53 ` [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Nathan Chancellor
` (3 subsequent siblings)
5 siblings, 3 replies; 34+ messages in thread
From: Arnd Bergmann @ 2022-03-01 14:52 UTC (permalink / raw)
To: Masahiro Yamada
Cc: Arnd Bergmann, Linus Torvalds, Marco Elver, Jani Nikula,
David Sterba, Alex Shi, Nick Desaulniers, Miguel Ojeda,
Mark Rutland, linux-kbuild, llvm, linux-doc, linux-kernel
From: Arnd Bergmann <arnd@arndb.de>
As we change the C language standard for the kernel from gnu89 to
gnu11, it makes sense to also update the version for user space
compilation.
Some users have older native compilers than what they use for
kernel builds, so I considered using gnu99 as the default version
for wider compatibility with gcc-4.6 and earlier.
However, testing with older compilers showed that we already require
HOSTCC version 5.1 as well because a lot of host tools include
linux/compiler.h that uses __has_attribute():
CC tools/objtool/exec-cmd.o
In file included from tools/include/linux/compiler_types.h:36:0,
from tools/include/linux/compiler.h:5,
from exec-cmd.c:2:
tools/include/linux/compiler-gcc.h:19:5: error: "__has_attribute" is not defined [-Werror=undef]
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index 37ef6a555dcd..7c9be7f1ccd4 100644
--- a/Makefile
+++ b/Makefile
@@ -432,7 +432,7 @@ HOSTCXX = g++
endif
export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
- -O2 -fomit-frame-pointer -std=gnu89 \
+ -O2 -fomit-frame-pointer -std=gnu11 \
-Wdeclaration-after-statement
export KBUILD_USERLDFLAGS :=
--
2.29.2
^ permalink raw reply related [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
@ 2022-03-01 16:53 ` Nathan Chancellor
2022-03-04 5:03 ` Masahiro Yamada
2022-03-04 11:24 ` Sedat Dilek
` (2 subsequent siblings)
5 siblings, 1 reply; 34+ messages in thread
From: Nathan Chancellor @ 2022-03-01 16:53 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Tue, Mar 01, 2022 at 03:52:31PM +0100, Arnd Bergmann wrote:
> From: Arnd Bergmann <arnd@arndb.de>
>
> During a patch discussion, Linus brought up the option of changing
> the C standard version from gnu89 to gnu99, which allows using variable
> declaration inside of a for() loop. While the C99, C11 and later standards
> introduce many other features, most of these are already available in
> gnu89 as GNU extensions as well.
>
> An earlier attempt to do this when gcc-5 started defaulting to
> -std=gnu11 failed because at the time that caused warnings about
> designated initializers with older compilers. Now that gcc-5.1 is
> the minimum compiler version used for building kernels, that is no
> longer a concern. Similarly, the behavior of 'inline' functions changes
> between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> behavior, but this was taken care of by defining 'inline' to include
> __attribute__((gnu_inline)) in order to allow building with clang a
> while ago.
>
> One minor issue that remains is an added gcc warning for shifts of
> negative integers when building with -Wextra, which happens with the
> 'make W=1' option, as well as for three drivers in the kernel that always
> enable -Wextra, but it was only observed with the i915 driver so far.
> To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> in a Makefile.
>
> Nathan Chancellor reported an additional -Wdeclaration-after-statement
> warning that appears in a system header on arm, this still needs a
> workaround.
>
> The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> minimal and mainly impact warnings at the -Wpedantic level that the
> kernel never enables. Between these, gnu11 is the newest version
> that is supported by all supported compiler versions, though it is
> only the default on gcc-5, while all other supported versions of
> gcc or clang default to gnu1x/gnu17.
>
> Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> Acked-by: Marco Elver <elver@google.com>
> Acked-by: Jani Nikula <jani.nikula@intel.com>
> Acked-by: David Sterba <dsterba@suse.com>
> Reviewed-by: Alex Shi <alexs@kernel.org>
> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> Cc: Masahiro Yamada <masahiroy@kernel.org>
> Cc: Mark Rutland <mark.rutland@arm.com>
> Cc: linux-kbuild@vger.kernel.org
> Cc: llvm@lists.linux.dev
> Cc: linux-doc@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
One comment below.
> ---
> [v3]
> - split out USERCFLAGS to a separate patch
> - add -Wdeclaration-after-statement patch from Mark Rutland
> - leave out C17 reference
> - more rewording the descrption
>
> [v2]
> - added -std=gnu11 back, rather than just relying on the default
> - minor changes to changelog text
> ---
> Documentation/process/programming-language.rst | 6 +++---
> .../translations/it_IT/process/programming-language.rst | 4 ++--
> .../translations/zh_CN/process/programming-language.rst | 3 +--
> .../translations/zh_TW/process/programming-language.rst | 3 +--
> Makefile | 4 ++--
> arch/arm64/kernel/vdso32/Makefile | 2 +-
> drivers/gpu/drm/i915/Makefile | 1 +
> drivers/staging/greybus/tools/Makefile | 3 ++-
> fs/btrfs/Makefile | 1 +
> scripts/Makefile.extrawarn | 1 +
> 10 files changed, 15 insertions(+), 13 deletions(-)
>
> diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> index ec474a70a02f..5fc9160ca1fa 100644
> --- a/Documentation/process/programming-language.rst
> +++ b/Documentation/process/programming-language.rst
> @@ -5,9 +5,9 @@ Programming Language
>
> The kernel is written in the C programming language [c-language]_.
> More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> -(including some C99 features). ``clang`` [clang]_ is also supported, see
> -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> +``clang`` [clang]_ is also supported, see docs on
> +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> This dialect contains many extensions to the language [gnu-extensions]_,
> and many of them are used within the kernel as a matter of course.
> diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> index 41db2598ce11..c1a9b481a6f9 100644
> --- a/Documentation/translations/it_IT/process/programming-language.rst
> +++ b/Documentation/translations/it_IT/process/programming-language.rst
> @@ -10,8 +10,8 @@ Linguaggio di programmazione
>
> Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> +dello standard ISO C11.
> Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> index 2a47a1d2ec20..fabdc338dbfb 100644
> --- a/Documentation/translations/zh_CN/process/programming-language.rst
> +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> @@ -9,8 +9,7 @@
> ============
>
> 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
>
> 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
>
> diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> index 54e3699eadf8..144bdaf81a41 100644
> --- a/Documentation/translations/zh_TW/process/programming-language.rst
> +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> @@ -12,8 +12,7 @@
> ============
>
> 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
>
> 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
>
> diff --git a/Makefile b/Makefile
> index 289ce2be8032..94fa9a849a7a 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> -Werror=implicit-function-declaration -Werror=implicit-int \
> -Werror=return-type -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> KBUILD_CPPFLAGS := -D__KERNEL__
> KBUILD_AFLAGS_KERNEL :=
> KBUILD_CFLAGS_KERNEL :=
> @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
>
> ifdef CONFIG_CC_IS_CLANG
> KBUILD_CPPFLAGS += -Qunused-arguments
> -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> KBUILD_CFLAGS += -Wno-gnu
> # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 6c01b63ff56d..9378ea055bf2 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> index 1b62b9f65196..1618a6e0af4e 100644
> --- a/drivers/gpu/drm/i915/Makefile
> +++ b/drivers/gpu/drm/i915/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> subdir-ccflags-y += -Wno-type-limits
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> +subdir-ccflags-y += -Wno-shift-negative-value
> subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> index ad0ae8053b79..a3bbd73171f2 100644
> --- a/drivers/staging/greybus/tools/Makefile
> +++ b/drivers/staging/greybus/tools/Makefile
> @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> -Wredundant-decls \
> -Wcast-align \
> -Wsign-compare \
> - -Wno-missing-field-initializers
> + -Wno-missing-field-initializers \
> + -Wno-shift-negative-value
This Makefile uses its own -std= option because it is a userland tool.
Seems like this hunk could just be dropped or the -std= argument could
be bumped here too?
> CC := $(CROSS_COMPILE)gcc
>
> diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
> index 4188ba3fd8c3..99f9995670ea 100644
> --- a/fs/btrfs/Makefile
> +++ b/fs/btrfs/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> subdir-ccflags-y += -Wno-type-limits
> +subdir-ccflags-y += -Wno-shift-negative-value
>
> obj-$(CONFIG_BTRFS_FS) := btrfs.o
>
> diff --git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
> index 8be892887d71..650d0b8ceec3 100644
> --- a/scripts/Makefile.extrawarn
> +++ b/scripts/Makefile.extrawarn
> @@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
> KBUILD_CFLAGS += -Wno-missing-field-initializers
> KBUILD_CFLAGS += -Wno-sign-compare
> KBUILD_CFLAGS += -Wno-type-limits
> +KBUILD_CFLAGS += -Wno-shift-negative-value
>
> KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
>
> --
> 2.29.2
>
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
@ 2022-03-01 16:54 ` Nathan Chancellor
2022-03-01 19:57 ` Nick Desaulniers
` (2 subsequent siblings)
3 siblings, 0 replies; 34+ messages in thread
From: Nathan Chancellor @ 2022-03-01 16:54 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Tue, Mar 01, 2022 at 03:52:32PM +0100, Arnd Bergmann wrote:
> From: Mark Rutland <mark.rutland@arm.com>
>
> In a subsequent patch we'll move the kernel from using `-std=gnu89` to
> `-std=gnu11`, permitting the use of additional C11 features such as
> for-loop initial declarations.
>
> One contentious aspect of C99 is that it permits mixed declarations and
> code, and for now at least, it seems preferable to enforce that
> declarations must come first.
>
> These warnings were already disabled in the kernel itself, but not
> for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> a separate set of CFLAGS.
>
> This patch fixes an existing violation in modpost.c, which is not
> reported because of the missing flag in KBUILD_USERCFLAGS:
>
> | scripts/mod/modpost.c: In function ‘match’:
> | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> | 837 | const char *endp = p + strlen(p) - 1;
> | | ^~~~~
>
> Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> [arnd: don't add a duplicate flag to the default set, update changelog]
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
> ---
> Makefile | 3 ++-
> arch/arm64/kernel/vdso32/Makefile | 1 +
> scripts/mod/modpost.c | 4 +++-
> 3 files changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/Makefile b/Makefile
> index 94fa9a849a7a..37ef6a555dcd 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,8 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89
> + -O2 -fomit-frame-pointer -std=gnu89 \
> + -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 9378ea055bf2..ed181bedbffc 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> + -Wdeclaration-after-statement \
> -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> index 6bfa33217914..fe693304b120 100644
> --- a/scripts/mod/modpost.c
> +++ b/scripts/mod/modpost.c
> @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> {
> const char *p;
> while (*pat) {
> + const char *endp;
> +
> p = *pat++;
> - const char *endp = p + strlen(p) - 1;
> + endp = p + strlen(p) - 1;
>
> /* "*foo*" */
> if (*p == '*' && *endp == '*') {
> --
> 2.29.2
>
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
@ 2022-03-01 17:00 ` Nathan Chancellor
2022-03-01 19:56 ` Nick Desaulniers
2022-03-02 22:14 ` Sedat Dilek
2 siblings, 0 replies; 34+ messages in thread
From: Nathan Chancellor @ 2022-03-01 17:00 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Tue, Mar 01, 2022 at 03:52:33PM +0100, Arnd Bergmann wrote:
> From: Arnd Bergmann <arnd@arndb.de>
>
> As we change the C language standard for the kernel from gnu89 to
> gnu11, it makes sense to also update the version for user space
> compilation.
>
> Some users have older native compilers than what they use for
> kernel builds, so I considered using gnu99 as the default version
> for wider compatibility with gcc-4.6 and earlier.
>
> However, testing with older compilers showed that we already require
> HOSTCC version 5.1 as well because a lot of host tools include
> linux/compiler.h that uses __has_attribute():
>
> CC tools/objtool/exec-cmd.o
> In file included from tools/include/linux/compiler_types.h:36:0,
> from tools/include/linux/compiler.h:5,
> from exec-cmd.c:2:
> tools/include/linux/compiler-gcc.h:19:5: error: "__has_attribute" is not defined [-Werror=undef]
For what it's worth, I think this is a bug:
https://lore.kernel.org/r/c1b1a299-c60d-28a4-07ab-1ecd211d6da9@i-love.sakura.ne.jp/
https://lore.kernel.org/r/20220102120201.594408-1-xu.xin16@zte.com.cn/
I never got clear feedback on resolving it from the first thread and
nobody bothered to pick up the second patch.
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Nobody has yelled that loud though, so this is probably fine.
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/Makefile b/Makefile
> index 37ef6a555dcd..7c9be7f1ccd4 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,7 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89 \
> + -O2 -fomit-frame-pointer -std=gnu11 \
> -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> --
> 2.29.2
>
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
2022-03-01 17:00 ` Nathan Chancellor
@ 2022-03-01 19:56 ` Nick Desaulniers
2022-03-02 22:14 ` Sedat Dilek
2 siblings, 0 replies; 34+ messages in thread
From: Nick Desaulniers @ 2022-03-01 19:56 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda, Mark Rutland,
linux-kbuild, llvm, linux-doc, linux-kernel
On Tue, Mar 1, 2022 at 6:52 AM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Arnd Bergmann <arnd@arndb.de>
>
> As we change the C language standard for the kernel from gnu89 to
> gnu11, it makes sense to also update the version for user space
> compilation.
>
> Some users have older native compilers than what they use for
> kernel builds, so I considered using gnu99 as the default version
> for wider compatibility with gcc-4.6 and earlier.
>
> However, testing with older compilers showed that we already require
> HOSTCC version 5.1 as well because a lot of host tools include
> linux/compiler.h that uses __has_attribute():
>
> CC tools/objtool/exec-cmd.o
> In file included from tools/include/linux/compiler_types.h:36:0,
> from tools/include/linux/compiler.h:5,
> from exec-cmd.c:2:
> tools/include/linux/compiler-gcc.h:19:5: error: "__has_attribute" is not defined [-Werror=undef]
>
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Thanks for the patches!
Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/Makefile b/Makefile
> index 37ef6a555dcd..7c9be7f1ccd4 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,7 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89 \
> + -O2 -fomit-frame-pointer -std=gnu11 \
> -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> --
> 2.29.2
>
--
Thanks,
~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
2022-03-01 16:54 ` Nathan Chancellor
@ 2022-03-01 19:57 ` Nick Desaulniers
2022-03-01 20:06 ` Nick Desaulniers
2022-03-03 0:44 ` Masahiro Yamada
2022-03-04 11:29 ` Sedat Dilek
3 siblings, 1 reply; 34+ messages in thread
From: Nick Desaulniers @ 2022-03-01 19:57 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda, Mark Rutland,
linux-kbuild, llvm, linux-doc, linux-kernel
On Tue, Mar 1, 2022 at 6:52 AM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Mark Rutland <mark.rutland@arm.com>
>
> In a subsequent patch we'll move the kernel from using `-std=gnu89` to
> `-std=gnu11`, permitting the use of additional C11 features such as
> for-loop initial declarations.
>
> One contentious aspect of C99 is that it permits mixed declarations and
> code, and for now at least, it seems preferable to enforce that
> declarations must come first.
>
> These warnings were already disabled in the kernel itself, but not
> for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> a separate set of CFLAGS.
>
> This patch fixes an existing violation in modpost.c, which is not
> reported because of the missing flag in KBUILD_USERCFLAGS:
>
> | scripts/mod/modpost.c: In function ‘match’:
> | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> | 837 | const char *endp = p + strlen(p) - 1;
> | | ^~~~~
>
> Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> [arnd: don't add a duplicate flag to the default set, update changelog]
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Thanks for the patches!
Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> ---
> Makefile | 3 ++-
> arch/arm64/kernel/vdso32/Makefile | 1 +
> scripts/mod/modpost.c | 4 +++-
> 3 files changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/Makefile b/Makefile
> index 94fa9a849a7a..37ef6a555dcd 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,8 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89
> + -O2 -fomit-frame-pointer -std=gnu89 \
> + -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 9378ea055bf2..ed181bedbffc 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> + -Wdeclaration-after-statement \
> -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> index 6bfa33217914..fe693304b120 100644
> --- a/scripts/mod/modpost.c
> +++ b/scripts/mod/modpost.c
> @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> {
> const char *p;
> while (*pat) {
> + const char *endp;
> +
> p = *pat++;
> - const char *endp = p + strlen(p) - 1;
> + endp = p + strlen(p) - 1;
>
> /* "*foo*" */
> if (*p == '*' && *endp == '*') {
> --
> 2.29.2
>
--
Thanks,
~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 19:57 ` Nick Desaulniers
@ 2022-03-01 20:06 ` Nick Desaulniers
2022-03-01 20:20 ` Linus Torvalds
0 siblings, 1 reply; 34+ messages in thread
From: Nick Desaulniers @ 2022-03-01 20:06 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda, Mark Rutland,
linux-kbuild, llvm, linux-doc, linux-kernel
On Tue, Mar 1, 2022 at 11:57 AM Nick Desaulniers
<ndesaulniers@google.com> wrote:
>
> On Tue, Mar 1, 2022 at 6:52 AM Arnd Bergmann <arnd@kernel.org> wrote:
> >
> > From: Mark Rutland <mark.rutland@arm.com>
> >
> > In a subsequent patch we'll move the kernel from using `-std=gnu89` to
> > `-std=gnu11`, permitting the use of additional C11 features such as
> > for-loop initial declarations.
> >
> > One contentious aspect of C99 is that it permits mixed declarations and
> > code, and for now at least, it seems preferable to enforce that
> > declarations must come first.
> >
> > These warnings were already disabled in the kernel itself, but not
> > for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> > a separate set of CFLAGS.
> >
> > This patch fixes an existing violation in modpost.c, which is not
> > reported because of the missing flag in KBUILD_USERCFLAGS:
> >
> > | scripts/mod/modpost.c: In function ‘match’:
> > | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> > | 837 | const char *endp = p + strlen(p) - 1;
> > | | ^~~~~
> >
> > Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> > [arnd: don't add a duplicate flag to the default set, update changelog]
> > Signed-off-by: Arnd Bergmann <arnd@arndb.de>
>
> Thanks for the patches!
> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
That said, there's a few additional places that reset KBUILD_CFLAGS.
$ git grep -rn "KBUILD_CFLAGS :=" | grep -v filter-out | grep -v subst
arch/mips/boot/compressed/Makefile:30:KBUILD_CFLAGS :=
$(KBUILD_CFLAGS) -D__KERNEL__ -D__DISABLE_EXPORTS \
arch/mips/vdso/Makefile:115:$(obj-vdso): KBUILD_CFLAGS :=
$(cflags-vdso) $(native-abi)
arch/mips/vdso/Makefile:144:$(obj-vdso-o32): KBUILD_CFLAGS :=
$(cflags-vdso) -mabi=32
arch/mips/vdso/Makefile:184:$(obj-vdso-n32): KBUILD_CFLAGS :=
$(cflags-vdso) -mabi=n32
arch/parisc/boot/compressed/Makefile:17:KBUILD_CFLAGS := -D__KERNEL__
-O2 -DBOOTLOADER
arch/s390/boot/Makefile:13:KBUILD_CFLAGS := $(KBUILD_CFLAGS_DECOMPRESSOR)
arch/s390/boot/compressed/Makefile:23:KBUILD_CFLAGS :=
$(KBUILD_CFLAGS_DECOMPRESSOR)
arch/s390/purgatory/Makefile:24:KBUILD_CFLAGS := -fno-strict-aliasing
-Wall -Wstrict-prototypes
arch/x86/boot/compressed/Makefile:35:KBUILD_CFLAGS := -m$(BITS) -O2
$(CLANG_FLAGS)
The parisc, s390, and x86 cases look like true positives to me (mips
looks fine FWICT). I didn't want to nack the patch for being
incomplete, but it's not necessarily treewide.
>
> > ---
> > Makefile | 3 ++-
> > arch/arm64/kernel/vdso32/Makefile | 1 +
> > scripts/mod/modpost.c | 4 +++-
> > 3 files changed, 6 insertions(+), 2 deletions(-)
> >
> > diff --git a/Makefile b/Makefile
> > index 94fa9a849a7a..37ef6a555dcd 100644
> > --- a/Makefile
> > +++ b/Makefile
> > @@ -432,7 +432,8 @@ HOSTCXX = g++
> > endif
> >
> > export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> > - -O2 -fomit-frame-pointer -std=gnu89
> > + -O2 -fomit-frame-pointer -std=gnu89 \
> > + -Wdeclaration-after-statement
> > export KBUILD_USERLDFLAGS :=
> >
> > KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> > diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> > index 9378ea055bf2..ed181bedbffc 100644
> > --- a/arch/arm64/kernel/vdso32/Makefile
> > +++ b/arch/arm64/kernel/vdso32/Makefile
> > @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common \
> > -Werror-implicit-function-declaration \
> > -Wno-format-security \
> > + -Wdeclaration-after-statement \
> > -std=gnu11
> > VDSO_CFLAGS += -O2
> > # Some useful compiler-dependent flags from top-level Makefile
> > diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> > index 6bfa33217914..fe693304b120 100644
> > --- a/scripts/mod/modpost.c
> > +++ b/scripts/mod/modpost.c
> > @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> > {
> > const char *p;
> > while (*pat) {
> > + const char *endp;
> > +
> > p = *pat++;
> > - const char *endp = p + strlen(p) - 1;
> > + endp = p + strlen(p) - 1;
> >
> > /* "*foo*" */
> > if (*p == '*' && *endp == '*') {
> > --
> > 2.29.2
> >
>
>
> --
> Thanks,
> ~Nick Desaulniers
--
Thanks,
~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 20:06 ` Nick Desaulniers
@ 2022-03-01 20:20 ` Linus Torvalds
2022-03-01 20:28 ` Nick Desaulniers
0 siblings, 1 reply; 34+ messages in thread
From: Linus Torvalds @ 2022-03-01 20:20 UTC (permalink / raw)
To: Nick Desaulniers
Cc: Arnd Bergmann, Masahiro Yamada, Arnd Bergmann, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda, Mark Rutland,
Linux Kbuild mailing list, llvm, open list:DOCUMENTATION,
Linux Kernel Mailing List
On Tue, Mar 1, 2022 at 12:06 PM Nick Desaulniers
<ndesaulniers@google.com> wrote:
>
> That said, there's a few additional places that reset KBUILD_CFLAGS.
Yeah, the boot code and vdso code often sets its own private flags,
because it's _so_ different.
The generic kernel CFLAGS often don't work at all, because that code
may be doing some truly horrendous things.
So I agree that this may not catch all the kernel code, but I don't
think it's much of a problem.
Linus
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 20:20 ` Linus Torvalds
@ 2022-03-01 20:28 ` Nick Desaulniers
0 siblings, 0 replies; 34+ messages in thread
From: Nick Desaulniers @ 2022-03-01 20:28 UTC (permalink / raw)
To: Linus Torvalds
Cc: Arnd Bergmann, Masahiro Yamada, Arnd Bergmann, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda, Mark Rutland,
Linux Kbuild mailing list, llvm, open list:DOCUMENTATION,
Linux Kernel Mailing List
On Tue, Mar 1, 2022 at 12:20 PM Linus Torvalds
<torvalds@linux-foundation.org> wrote:
>
> On Tue, Mar 1, 2022 at 12:06 PM Nick Desaulniers
> <ndesaulniers@google.com> wrote:
> >
> > That said, there's a few additional places that reset KBUILD_CFLAGS.
>
> Yeah, the boot code and vdso code often sets its own private flags,
> because it's _so_ different.
>
> The generic kernel CFLAGS often don't work at all, because that code
> may be doing some truly horrendous things.
>
> So I agree that this may not catch all the kernel code, but I don't
> think it's much of a problem.
Agreed; they can still mirror the style imposed by
-Wdeclaration-after-statement like the rest of the codebase though.
--
Thanks,
~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
2022-03-01 17:00 ` Nathan Chancellor
2022-03-01 19:56 ` Nick Desaulniers
@ 2022-03-02 22:14 ` Sedat Dilek
2022-03-02 22:54 ` Nick Desaulniers
2 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-02 22:14 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Wed, Mar 2, 2022 at 10:47 AM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Arnd Bergmann <arnd@arndb.de>
>
> As we change the C language standard for the kernel from gnu89 to
> gnu11, it makes sense to also update the version for user space
> compilation.
>
Overdue.
Can you point me to a lore link where I can easily fetch the full 3/3
v3 patchset?
I would like to give this a try on x86-64 with my latest kernel-config
(based on the latest kernel-config v5.17-rc5 from Debian/unstable).
What Linux source base do I need?
Is Linux v5.17-rc6 good enough (patchset applicable) for testing?
Thanks, Arnd.
Regards,
- Sedat -
> Some users have older native compilers than what they use for
> kernel builds, so I considered using gnu99 as the default version
> for wider compatibility with gcc-4.6 and earlier.
>
> However, testing with older compilers showed that we already require
> HOSTCC version 5.1 as well because a lot of host tools include
> linux/compiler.h that uses __has_attribute():
>
> CC tools/objtool/exec-cmd.o
> In file included from tools/include/linux/compiler_types.h:36:0,
> from tools/include/linux/compiler.h:5,
> from exec-cmd.c:2:
> tools/include/linux/compiler-gcc.h:19:5: error: "__has_attribute" is not defined [-Werror=undef]
>
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/Makefile b/Makefile
> index 37ef6a555dcd..7c9be7f1ccd4 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,7 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89 \
> + -O2 -fomit-frame-pointer -std=gnu11 \
> -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> --
> 2.29.2
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-02 22:14 ` Sedat Dilek
@ 2022-03-02 22:54 ` Nick Desaulniers
2022-03-03 6:26 ` Sedat Dilek
0 siblings, 1 reply; 34+ messages in thread
From: Nick Desaulniers @ 2022-03-02 22:54 UTC (permalink / raw)
To: sedat.dilek
Cc: Arnd Bergmann, Masahiro Yamada, Arnd Bergmann, Linus Torvalds,
Marco Elver, Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda,
Mark Rutland, linux-kbuild, llvm, linux-doc, linux-kernel
On Wed, Mar 2, 2022 at 2:14 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Wed, Mar 2, 2022 at 10:47 AM Arnd Bergmann <arnd@kernel.org> wrote:
> >
> > From: Arnd Bergmann <arnd@arndb.de>
> >
> > As we change the C language standard for the kernel from gnu89 to
> > gnu11, it makes sense to also update the version for user space
> > compilation.
> >
>
> Overdue.
>
> Can you point me to a lore link where I can easily fetch the full 3/3
> v3 patchset?
Hey Sedat!
$ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
-o - | git am -3
https://people.kernel.org/monsieuricon/introducing-b4-and-patch-attestation
>
> I would like to give this a try on x86-64 with my latest kernel-config
> (based on the latest kernel-config v5.17-rc5 from Debian/unstable).
>
> What Linux source base do I need?
> Is Linux v5.17-rc6 good enough (patchset applicable) for testing?
I suspect so.
--
Thanks,
~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
2022-03-01 16:54 ` Nathan Chancellor
2022-03-01 19:57 ` Nick Desaulniers
@ 2022-03-03 0:44 ` Masahiro Yamada
2022-03-04 11:29 ` Sedat Dilek
3 siblings, 0 replies; 34+ messages in thread
From: Masahiro Yamada @ 2022-03-03 0:44 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Arnd Bergmann, Linus Torvalds, Marco Elver, Jani Nikula,
David Sterba, Alex Shi, Nick Desaulniers, Miguel Ojeda,
Mark Rutland, Linux Kbuild mailing list, llvm,
open list:DOCUMENTATION, Linux Kernel Mailing List
On Tue, Mar 1, 2022 at 11:52 PM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Mark Rutland <mark.rutland@arm.com>
>
> In a subsequent patch we'll move the kernel from using `-std=gnu89` to
Precisely speaking,
"In a subsequent patch we'll move the userspace tools ..."
The kernel part was done by 1/3.
> `-std=gnu11`, permitting the use of additional C11 features such as
> for-loop initial declarations.
>
> One contentious aspect of C99 is that it permits mixed declarations and
> code, and for now at least, it seems preferable to enforce that
> declarations must come first.
>
> These warnings were already disabled in the kernel itself, but not
Is this the opposite?
"These warnings were already _enabled_ in the kernel itself, ..."
If you have a chance to resend this,
can you please rebase on top of kbuild/for-next?
This is not applicable due to the conflict with:
https://patchwork.kernel.org/project/linux-kbuild/patch/20220201213542.2808035-1-quic_eberman@quicinc.com/
> for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> a separate set of CFLAGS.
>
> This patch fixes an existing violation in modpost.c, which is not
> reported because of the missing flag in KBUILD_USERCFLAGS:
>
> | scripts/mod/modpost.c: In function ‘match’:
> | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> | 837 | const char *endp = p + strlen(p) - 1;
> | | ^~~~~
>
> Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> [arnd: don't add a duplicate flag to the default set, update changelog]
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
> ---
> Makefile | 3 ++-
> arch/arm64/kernel/vdso32/Makefile | 1 +
> scripts/mod/modpost.c | 4 +++-
> 3 files changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/Makefile b/Makefile
> index 94fa9a849a7a..37ef6a555dcd 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,8 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89
> + -O2 -fomit-frame-pointer -std=gnu89 \
> + -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 9378ea055bf2..ed181bedbffc 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> + -Wdeclaration-after-statement \
> -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> index 6bfa33217914..fe693304b120 100644
> --- a/scripts/mod/modpost.c
> +++ b/scripts/mod/modpost.c
> @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> {
> const char *p;
> while (*pat) {
> + const char *endp;
> +
> p = *pat++;
> - const char *endp = p + strlen(p) - 1;
> + endp = p + strlen(p) - 1;
>
> /* "*foo*" */
> if (*p == '*' && *endp == '*') {
> --
> 2.29.2
>
--
Best Regards
Masahiro Yamada
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-02 22:54 ` Nick Desaulniers
@ 2022-03-03 6:26 ` Sedat Dilek
2022-03-03 17:37 ` Nathan Chancellor
0 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-03 6:26 UTC (permalink / raw)
To: Nick Desaulniers
Cc: Arnd Bergmann, Masahiro Yamada, Arnd Bergmann, Linus Torvalds,
Marco Elver, Jani Nikula, David Sterba, Alex Shi, Miguel Ojeda,
Mark Rutland, linux-kbuild, llvm, linux-doc, linux-kernel
On Wed, Mar 2, 2022 at 11:54 PM Nick Desaulniers
<ndesaulniers@google.com> wrote:
>
> On Wed, Mar 2, 2022 at 2:14 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
> >
> > On Wed, Mar 2, 2022 at 10:47 AM Arnd Bergmann <arnd@kernel.org> wrote:
> > >
> > > From: Arnd Bergmann <arnd@arndb.de>
> > >
> > > As we change the C language standard for the kernel from gnu89 to
> > > gnu11, it makes sense to also update the version for user space
> > > compilation.
> > >
> >
> > Overdue.
> >
> > Can you point me to a lore link where I can easily fetch the full 3/3
> > v3 patchset?
>
> Hey Sedat!
>
> $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> -o - | git am -3
>
Hey Nick!
This only applies 1/3.
$ b4 --version
0.8.0
$ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
-o - | git am -3
Analyzing 14 messages in the thread
Will use the latest revision: v3
You can pick other revisions using the -vN flag
Checking attestation on all messages, may take a moment...
---
✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
✓ Signed: DKIM/kernel.org
+ Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
ERROR: missing [2/3]!
ERROR: missing [3/3]!
---
NOTE: install patatt for end-to-end signature verification
---
Total patches: 1
---
WARNING: Thread incomplete!
Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
Base: not specified
Wende an: Kbuild: move to -std=gnu11
- Sedat -
> https://people.kernel.org/monsieuricon/introducing-b4-and-patch-attestation
>
> >
> > I would like to give this a try on x86-64 with my latest kernel-config
> > (based on the latest kernel-config v5.17-rc5 from Debian/unstable).
> >
> > What Linux source base do I need?
> > Is Linux v5.17-rc6 good enough (patchset applicable) for testing?
>
> I suspect so.
> --
> Thanks,
> ~Nick Desaulniers
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-03 6:26 ` Sedat Dilek
@ 2022-03-03 17:37 ` Nathan Chancellor
2022-03-04 6:47 ` Sedat Dilek
0 siblings, 1 reply; 34+ messages in thread
From: Nathan Chancellor @ 2022-03-03 17:37 UTC (permalink / raw)
To: Sedat Dilek
Cc: Nick Desaulniers, Arnd Bergmann, Masahiro Yamada, Arnd Bergmann,
Linus Torvalds, Marco Elver, Jani Nikula, David Sterba, Alex Shi,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
Hi Sedat,
On Thu, Mar 03, 2022 at 07:26:05AM +0100, Sedat Dilek wrote:
> Hey Nick!
>
> This only applies 1/3.
>
> $ b4 --version
> 0.8.0
>
> $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> -o - | git am -3
> Analyzing 14 messages in the thread
> Will use the latest revision: v3
> You can pick other revisions using the -vN flag
> Checking attestation on all messages, may take a moment...
> ---
> ✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
> ✓ Signed: DKIM/kernel.org
> + Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
> ERROR: missing [2/3]!
> ERROR: missing [3/3]!
> ---
> NOTE: install patatt for end-to-end signature verification
> ---
> Total patches: 1
> ---
> WARNING: Thread incomplete!
> Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
> Base: not specified
> Wende an: Kbuild: move to -std=gnu11
It looks like the threading somehow got broken, likely due to the [v3]
on the first patch and not the second or third:
This worked for me on v5.17-rc6:
$ for i in $(seq 1 3); do b4 shazam -P _ 20220301145233.3689119-"$i"-arnd@kernel.org; done
"b4 shazam" is the equivalent of "b4 am -o - ... | git am" and the
"-P _" tells b4 to only fetch that exact message ID, not the whole
thread.
Cheers,
Nathan
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-01 16:53 ` [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Nathan Chancellor
@ 2022-03-04 5:03 ` Masahiro Yamada
0 siblings, 0 replies; 34+ messages in thread
From: Masahiro Yamada @ 2022-03-04 5:03 UTC (permalink / raw)
To: Nathan Chancellor
Cc: Arnd Bergmann, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, Linux Kbuild mailing list, llvm,
open list:DOCUMENTATION, Linux Kernel Mailing List
On Wed, Mar 2, 2022 at 1:53 AM Nathan Chancellor <nathan@kernel.org> wrote:
>
> On Tue, Mar 01, 2022 at 03:52:31PM +0100, Arnd Bergmann wrote:
> > From: Arnd Bergmann <arnd@arndb.de>
> >
> > During a patch discussion, Linus brought up the option of changing
> > the C standard version from gnu89 to gnu99, which allows using variable
> > declaration inside of a for() loop. While the C99, C11 and later standards
> > introduce many other features, most of these are already available in
> > gnu89 as GNU extensions as well.
> >
> > An earlier attempt to do this when gcc-5 started defaulting to
> > -std=gnu11 failed because at the time that caused warnings about
> > designated initializers with older compilers. Now that gcc-5.1 is
> > the minimum compiler version used for building kernels, that is no
> > longer a concern. Similarly, the behavior of 'inline' functions changes
> > between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> > behavior, but this was taken care of by defining 'inline' to include
> > __attribute__((gnu_inline)) in order to allow building with clang a
> > while ago.
> >
> > One minor issue that remains is an added gcc warning for shifts of
> > negative integers when building with -Wextra, which happens with the
> > 'make W=1' option, as well as for three drivers in the kernel that always
> > enable -Wextra, but it was only observed with the i915 driver so far.
> > To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> > in a Makefile.
> >
> > Nathan Chancellor reported an additional -Wdeclaration-after-statement
> > warning that appears in a system header on arm, this still needs a
> > workaround.
> >
> > The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> > minimal and mainly impact warnings at the -Wpedantic level that the
> > kernel never enables. Between these, gnu11 is the newest version
> > that is supported by all supported compiler versions, though it is
> > only the default on gcc-5, while all other supported versions of
> > gcc or clang default to gnu1x/gnu17.
> >
> > Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> > Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> > Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> > Acked-by: Marco Elver <elver@google.com>
> > Acked-by: Jani Nikula <jani.nikula@intel.com>
> > Acked-by: David Sterba <dsterba@suse.com>
> > Reviewed-by: Alex Shi <alexs@kernel.org>
> > Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> > Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> > Cc: Masahiro Yamada <masahiroy@kernel.org>
> > Cc: Mark Rutland <mark.rutland@arm.com>
> > Cc: linux-kbuild@vger.kernel.org
> > Cc: llvm@lists.linux.dev
> > Cc: linux-doc@vger.kernel.org
> > Cc: linux-kernel@vger.kernel.org
> > Signed-off-by: Arnd Bergmann <arnd@arndb.de>
>
> Reviewed-by: Nathan Chancellor <nathan@kernel.org>
>
> One comment below.
>
> > ---
> > [v3]
> > - split out USERCFLAGS to a separate patch
> > - add -Wdeclaration-after-statement patch from Mark Rutland
> > - leave out C17 reference
> > - more rewording the descrption
> >
> > [v2]
> > - added -std=gnu11 back, rather than just relying on the default
> > - minor changes to changelog text
> > ---
> > Documentation/process/programming-language.rst | 6 +++---
> > .../translations/it_IT/process/programming-language.rst | 4 ++--
> > .../translations/zh_CN/process/programming-language.rst | 3 +--
> > .../translations/zh_TW/process/programming-language.rst | 3 +--
> > Makefile | 4 ++--
> > arch/arm64/kernel/vdso32/Makefile | 2 +-
> > drivers/gpu/drm/i915/Makefile | 1 +
> > drivers/staging/greybus/tools/Makefile | 3 ++-
> > fs/btrfs/Makefile | 1 +
> > scripts/Makefile.extrawarn | 1 +
> > 10 files changed, 15 insertions(+), 13 deletions(-)
> >
> > diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> > index ec474a70a02f..5fc9160ca1fa 100644
> > --- a/Documentation/process/programming-language.rst
> > +++ b/Documentation/process/programming-language.rst
> > @@ -5,9 +5,9 @@ Programming Language
> >
> > The kernel is written in the C programming language [c-language]_.
> > More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> > -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> > -(including some C99 features). ``clang`` [clang]_ is also supported, see
> > -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> > +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> > +``clang`` [clang]_ is also supported, see docs on
> > +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> >
> > This dialect contains many extensions to the language [gnu-extensions]_,
> > and many of them are used within the kernel as a matter of course.
> > diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> > index 41db2598ce11..c1a9b481a6f9 100644
> > --- a/Documentation/translations/it_IT/process/programming-language.rst
> > +++ b/Documentation/translations/it_IT/process/programming-language.rst
> > @@ -10,8 +10,8 @@ Linguaggio di programmazione
> >
> > Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> > Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> > -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> > -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> > +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> > +dello standard ISO C11.
> > Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> > :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> >
> > diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> > index 2a47a1d2ec20..fabdc338dbfb 100644
> > --- a/Documentation/translations/zh_CN/process/programming-language.rst
> > +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> > @@ -9,8 +9,7 @@
> > ============
> >
> > 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> > -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> > -包括一些C99特性)
> > +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
> >
> > 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
> >
> > diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> > index 54e3699eadf8..144bdaf81a41 100644
> > --- a/Documentation/translations/zh_TW/process/programming-language.rst
> > +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> > @@ -12,8 +12,7 @@
> > ============
> >
> > 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> > -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> > -包括一些C99特性)
> > +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
> >
> > 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
> >
> > diff --git a/Makefile b/Makefile
> > index 289ce2be8032..94fa9a849a7a 100644
> > --- a/Makefile
> > +++ b/Makefile
> > @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> > -Werror=implicit-function-declaration -Werror=implicit-int \
> > -Werror=return-type -Wno-format-security \
> > - -std=gnu89
> > + -std=gnu11
> > KBUILD_CPPFLAGS := -D__KERNEL__
> > KBUILD_AFLAGS_KERNEL :=
> > KBUILD_CFLAGS_KERNEL :=
> > @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
> >
> > ifdef CONFIG_CC_IS_CLANG
> > KBUILD_CPPFLAGS += -Qunused-arguments
> > -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> > +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> > KBUILD_CFLAGS += -Wno-gnu
> > # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> > # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> > diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> > index 6c01b63ff56d..9378ea055bf2 100644
> > --- a/arch/arm64/kernel/vdso32/Makefile
> > +++ b/arch/arm64/kernel/vdso32/Makefile
> > @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common \
> > -Werror-implicit-function-declaration \
> > -Wno-format-security \
> > - -std=gnu89
> > + -std=gnu11
> > VDSO_CFLAGS += -O2
> > # Some useful compiler-dependent flags from top-level Makefile
> > VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> > diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> > index 1b62b9f65196..1618a6e0af4e 100644
> > --- a/drivers/gpu/drm/i915/Makefile
> > +++ b/drivers/gpu/drm/i915/Makefile
> > @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> > subdir-ccflags-y += -Wno-type-limits
> > subdir-ccflags-y += -Wno-missing-field-initializers
> > subdir-ccflags-y += -Wno-sign-compare
> > +subdir-ccflags-y += -Wno-shift-negative-value
> > subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> > subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> > subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> > diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> > index ad0ae8053b79..a3bbd73171f2 100644
> > --- a/drivers/staging/greybus/tools/Makefile
> > +++ b/drivers/staging/greybus/tools/Makefile
> > @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> > -Wredundant-decls \
> > -Wcast-align \
> > -Wsign-compare \
> > - -Wno-missing-field-initializers
> > + -Wno-missing-field-initializers \
> > + -Wno-shift-negative-value
>
> This Makefile uses its own -std= option because it is a userland tool.
> Seems like this hunk could just be dropped or the -std= argument could
> be bumped here too?
>
Right, this is a userland tool.
I do not mind either way.
BTW, this makefile is somewhat corrupted
because ../greybus_protocols.h does not exist.
(but it is working, relying on the built-in rules)
If Arnd does not mind sending v4, maybe we
can split this into two paches:
1/4 : add -Wno-shift-negative-value where -Wextra is used
2/4 : Kbuild: move to -std=gnu11
1/4 adds -Wno-shift-negative-value
whether it is the kernel space or user-land.
--
Best Regards
Masahiro Yamada
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-03 17:37 ` Nathan Chancellor
@ 2022-03-04 6:47 ` Sedat Dilek
2022-03-04 7:18 ` Sedat Dilek
0 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 6:47 UTC (permalink / raw)
To: Nathan Chancellor
Cc: Nick Desaulniers, Arnd Bergmann, Masahiro Yamada, Arnd Bergmann,
Linus Torvalds, Marco Elver, Jani Nikula, David Sterba, Alex Shi,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Thu, Mar 3, 2022 at 6:37 PM Nathan Chancellor <nathan@kernel.org> wrote:
>
> Hi Sedat,
>
> On Thu, Mar 03, 2022 at 07:26:05AM +0100, Sedat Dilek wrote:
> > Hey Nick!
> >
> > This only applies 1/3.
> >
> > $ b4 --version
> > 0.8.0
> >
> > $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> > -o - | git am -3
> > Analyzing 14 messages in the thread
> > Will use the latest revision: v3
> > You can pick other revisions using the -vN flag
> > Checking attestation on all messages, may take a moment...
> > ---
> > ✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
> > ✓ Signed: DKIM/kernel.org
> > + Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
> > ERROR: missing [2/3]!
> > ERROR: missing [3/3]!
> > ---
> > NOTE: install patatt for end-to-end signature verification
> > ---
> > Total patches: 1
> > ---
> > WARNING: Thread incomplete!
> > Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
> > Base: not specified
> > Wende an: Kbuild: move to -std=gnu11
>
> It looks like the threading somehow got broken, likely due to the [v3]
> on the first patch and not the second or third:
>
> This worked for me on v5.17-rc6:
>
> $ for i in $(seq 1 3); do b4 shazam -P _ 20220301145233.3689119-"$i"-arnd@kernel.org; done
>
> "b4 shazam" is the equivalent of "b4 am -o - ... | git am" and the
> "-P _" tells b4 to only fetch that exact message ID, not the whole
> thread.
>
Hmm, the universe is not good to me...
$ for i in $(seq 1 3); do b4 shazam -P _
20220301145233.3689119-"$i"-arnd@kernel.org; done
usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
b4: error: argument subcmd: invalid choice: 'shazam' (choose from
'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
b4: error: argument subcmd: invalid choice: 'shazam' (choose from
'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
b4: error: argument subcmd: invalid choice: 'shazam' (choose from
'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
Do I need a higher version of b4 (here: v0.8.0)?
Check myself... b4.git:
commit 7c1d044ff1d5235e598d4c777c4abfe60e0a09a8
("shazam: change default behaviour to be "apply-here"")
...is post-v0.8.0.
Lemme see if I can apply this patch...
# cd /usr/lib/python3/dist-packages
# LC_ALL=C git apply --check --verbose /root/b4-shazam.patch
Checking patch b4/command.py...
error: while searching for:
sp.add_argument('-M', '--save-as-maildir', dest='maildir',
action='store_true', default=False,
help='Save as maildir (avoids mbox format ambiguities)')
def cmd_am_common_opts(sp):
sp.add_argument('-v', '--use-version', dest='wantver', type=int,
default=None,
help='Get a specific version of the patch/series')
error: patch failed: b4/command.py:35
error: b4/command.py: patch does not apply
Checking patch b4/mbox.py...
error: while searching for:
ifh = io.StringIO()
b4.save_git_am_mbox(am_msgs, ifh)
ambytes = ifh.getvalue().encode()
if cmdargs.applyhere:
amflags = config.get('git-am-flags', '')
sp = shlex.shlex(amflags, posix=True)
sp.whitespace_split = True
error: patch failed: b4/mbox.py:262
error: b4/mbox.py: patch does not apply
Nope.
Dunno if I am willing to do that manually or build-from-git.
Anyway, can you add this b4 shazam tipp/trick to our wiki, please?
Last question:
LLVM/Clang-14...
Do I need any patches to Linux v5.17-rc6 or upstream Git?
Dependent/Independent of "std-gnu-11"?
I can see on my Debian/unstable AMD64 system:
# LC_ALL=C apt-cache policy clang-14
clang-14:
Installed: (none)
Candidate: 1:14.0.0~++20220301114802+19149538e9a9-1~exp1~20220301234814.85
Version table:
1:14.0.0~++20220301114802+19149538e9a9-1~exp1~20220301234814.85 99
99 https://apt.llvm.org/unstable llvm-toolchain-14/main amd64 Packages
1:14.0.0~+rc1-1 99
99 https://ftp.debian.org/debian unstable/main amd64 Packages
99 https://deb.debian.org/debian unstable/main amd64 Packages
The one from apt.llvm.org I guess is LLVM/Clang v14.0.0-rc2?
Maybe, I wait until Masahiroy has the triple in his kbuild Git tree...
Thanks.
Have a nice Friday,
- sed@ -
[1] https://git.kernel.org/pub/scm/utils/b4/b4.git/tag/?h=v0.8.0
[2] https://git.kernel.org/pub/scm/utils/b4/b4.git/commit/?id=7c1d044ff1d5235e598d4c777c4abfe60e0a09a8
[3] https://github.com/ClangBuiltLinux/linux/wiki/Command-line-tips-and-tricks
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-04 6:47 ` Sedat Dilek
@ 2022-03-04 7:18 ` Sedat Dilek
2022-03-04 11:12 ` Sedat Dilek
0 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 7:18 UTC (permalink / raw)
To: Nathan Chancellor
Cc: Nick Desaulniers, Arnd Bergmann, Masahiro Yamada, Arnd Bergmann,
Linus Torvalds, Marco Elver, Jani Nikula, David Sterba, Alex Shi,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 7:47 AM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Thu, Mar 3, 2022 at 6:37 PM Nathan Chancellor <nathan@kernel.org> wrote:
> >
> > Hi Sedat,
> >
> > On Thu, Mar 03, 2022 at 07:26:05AM +0100, Sedat Dilek wrote:
> > > Hey Nick!
> > >
> > > This only applies 1/3.
> > >
> > > $ b4 --version
> > > 0.8.0
> > >
> > > $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> > > -o - | git am -3
> > > Analyzing 14 messages in the thread
> > > Will use the latest revision: v3
> > > You can pick other revisions using the -vN flag
> > > Checking attestation on all messages, may take a moment...
> > > ---
> > > ✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
> > > ✓ Signed: DKIM/kernel.org
> > > + Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
> > > ERROR: missing [2/3]!
> > > ERROR: missing [3/3]!
> > > ---
> > > NOTE: install patatt for end-to-end signature verification
> > > ---
> > > Total patches: 1
> > > ---
> > > WARNING: Thread incomplete!
> > > Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
> > > Base: not specified
> > > Wende an: Kbuild: move to -std=gnu11
> >
> > It looks like the threading somehow got broken, likely due to the [v3]
> > on the first patch and not the second or third:
> >
> > This worked for me on v5.17-rc6:
> >
> > $ for i in $(seq 1 3); do b4 shazam -P _ 20220301145233.3689119-"$i"-arnd@kernel.org; done
> >
> > "b4 shazam" is the equivalent of "b4 am -o - ... | git am" and the
> > "-P _" tells b4 to only fetch that exact message ID, not the whole
> > thread.
> >
>
> Hmm, the universe is not good to me...
>
> $ for i in $(seq 1 3); do b4 shazam -P _
> 20220301145233.3689119-"$i"-arnd@kernel.org; done
> usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
>
> Do I need a higher version of b4 (here: v0.8.0)?
>
> Check myself... b4.git:
>
> commit 7c1d044ff1d5235e598d4c777c4abfe60e0a09a8
> ("shazam: change default behaviour to be "apply-here"")
>
> ...is post-v0.8.0.
>
I brutally applied the post-v0.8.0 patches stolen from b4.git over my
local distro b4 files.
And was able to apply the triple:
$ git log --oneline --no-merges
5.17.0-rc6-1-amd64-clang13-lto..5.17.0-rc6-2-amd64-clang13-lto
96a4222bdd4c (for-5.17/kbuild-std_gnu11-arndb-20220301) Kbuild: use
-std=gnu11 for KBUILD_USERCFLAGS
c4e8cef401a8 treewide: use -Wdeclaration-after-statement
6a7cc105b238 Kbuild: move to -std=gnu11
- sed@ -
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-04 7:18 ` Sedat Dilek
@ 2022-03-04 11:12 ` Sedat Dilek
2022-03-06 10:04 ` Sedat Dilek
0 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 11:12 UTC (permalink / raw)
To: Nathan Chancellor
Cc: Nick Desaulniers, Arnd Bergmann, Masahiro Yamada, Arnd Bergmann,
Linus Torvalds, Marco Elver, Jani Nikula, David Sterba, Alex Shi,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 8:18 AM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Fri, Mar 4, 2022 at 7:47 AM Sedat Dilek <sedat.dilek@gmail.com> wrote:
> >
> > On Thu, Mar 3, 2022 at 6:37 PM Nathan Chancellor <nathan@kernel.org> wrote:
> > >
> > > Hi Sedat,
> > >
> > > On Thu, Mar 03, 2022 at 07:26:05AM +0100, Sedat Dilek wrote:
> > > > Hey Nick!
> > > >
> > > > This only applies 1/3.
> > > >
> > > > $ b4 --version
> > > > 0.8.0
> > > >
> > > > $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> > > > -o - | git am -3
> > > > Analyzing 14 messages in the thread
> > > > Will use the latest revision: v3
> > > > You can pick other revisions using the -vN flag
> > > > Checking attestation on all messages, may take a moment...
> > > > ---
> > > > ✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
> > > > ✓ Signed: DKIM/kernel.org
> > > > + Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
> > > > ERROR: missing [2/3]!
> > > > ERROR: missing [3/3]!
> > > > ---
> > > > NOTE: install patatt for end-to-end signature verification
> > > > ---
> > > > Total patches: 1
> > > > ---
> > > > WARNING: Thread incomplete!
> > > > Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
> > > > Base: not specified
> > > > Wende an: Kbuild: move to -std=gnu11
> > >
> > > It looks like the threading somehow got broken, likely due to the [v3]
> > > on the first patch and not the second or third:
> > >
> > > This worked for me on v5.17-rc6:
> > >
> > > $ for i in $(seq 1 3); do b4 shazam -P _ 20220301145233.3689119-"$i"-arnd@kernel.org; done
> > >
> > > "b4 shazam" is the equivalent of "b4 am -o - ... | git am" and the
> > > "-P _" tells b4 to only fetch that exact message ID, not the whole
> > > thread.
> > >
> >
> > Hmm, the universe is not good to me...
> >
> > $ for i in $(seq 1 3); do b4 shazam -P _
> > 20220301145233.3689119-"$i"-arnd@kernel.org; done
> > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> >
> > Do I need a higher version of b4 (here: v0.8.0)?
> >
> > Check myself... b4.git:
> >
> > commit 7c1d044ff1d5235e598d4c777c4abfe60e0a09a8
> > ("shazam: change default behaviour to be "apply-here"")
> >
> > ...is post-v0.8.0.
> >
>
> I brutally applied the post-v0.8.0 patches stolen from b4.git over my
> local distro b4 files.
>
> And was able to apply the triple:
>
> $ git log --oneline --no-merges
> 5.17.0-rc6-1-amd64-clang13-lto..5.17.0-rc6-2-amd64-clang13-lto
> 96a4222bdd4c (for-5.17/kbuild-std_gnu11-arndb-20220301) Kbuild: use
> -std=gnu11 for KBUILD_USERCFLAGS
> c4e8cef401a8 treewide: use -Wdeclaration-after-statement
> 6a7cc105b238 Kbuild: move to -std=gnu11
>
I was able to build and boot on bare metal.
No new warnings in my build-log here after switching to -std=gnu11.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
- sed@ -
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
` (2 preceding siblings ...)
2022-03-01 16:53 ` [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Nathan Chancellor
@ 2022-03-04 11:24 ` Sedat Dilek
2022-03-06 10:01 ` Sedat Dilek
2022-03-04 11:37 ` Sedat Dilek
2022-03-04 16:25 ` Sedat Dilek
5 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 11:24 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Wed, Mar 2, 2022 at 5:29 PM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Arnd Bergmann <arnd@arndb.de>
>
> During a patch discussion, Linus brought up the option of changing
> the C standard version from gnu89 to gnu99, which allows using variable
> declaration inside of a for() loop. While the C99, C11 and later standards
> introduce many other features, most of these are already available in
> gnu89 as GNU extensions as well.
>
> An earlier attempt to do this when gcc-5 started defaulting to
> -std=gnu11 failed because at the time that caused warnings about
> designated initializers with older compilers. Now that gcc-5.1 is
> the minimum compiler version used for building kernels, that is no
> longer a concern. Similarly, the behavior of 'inline' functions changes
> between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> behavior, but this was taken care of by defining 'inline' to include
> __attribute__((gnu_inline)) in order to allow building with clang a
> while ago.
>
> One minor issue that remains is an added gcc warning for shifts of
> negative integers when building with -Wextra, which happens with the
> 'make W=1' option, as well as for three drivers in the kernel that always
> enable -Wextra, but it was only observed with the i915 driver so far.
> To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> in a Makefile.
>
> Nathan Chancellor reported an additional -Wdeclaration-after-statement
> warning that appears in a system header on arm, this still needs a
> workaround.
>
> The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> minimal and mainly impact warnings at the -Wpedantic level that the
> kernel never enables. Between these, gnu11 is the newest version
> that is supported by all supported compiler versions, though it is
> only the default on gcc-5, while all other supported versions of
> gcc or clang default to gnu1x/gnu17.
>
> Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> Acked-by: Marco Elver <elver@google.com>
> Acked-by: Jani Nikula <jani.nikula@intel.com>
> Acked-by: David Sterba <dsterba@suse.com>
> Reviewed-by: Alex Shi <alexs@kernel.org>
> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> Cc: Masahiro Yamada <masahiroy@kernel.org>
> Cc: Mark Rutland <mark.rutland@arm.com>
> Cc: linux-kbuild@vger.kernel.org
> Cc: llvm@lists.linux.dev
> Cc: linux-doc@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
> ---
> [v3]
> - split out USERCFLAGS to a separate patch
> - add -Wdeclaration-after-statement patch from Mark Rutland
> - leave out C17 reference
> - more rewording the descrption
>
I was able to build and boot on bare metal.
No new warnings in my build-log here after switching to -std=gnu11.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
- sed@ -
> [v2]
> - added -std=gnu11 back, rather than just relying on the default
> - minor changes to changelog text
> ---
> Documentation/process/programming-language.rst | 6 +++---
> .../translations/it_IT/process/programming-language.rst | 4 ++--
> .../translations/zh_CN/process/programming-language.rst | 3 +--
> .../translations/zh_TW/process/programming-language.rst | 3 +--
> Makefile | 4 ++--
> arch/arm64/kernel/vdso32/Makefile | 2 +-
> drivers/gpu/drm/i915/Makefile | 1 +
> drivers/staging/greybus/tools/Makefile | 3 ++-
> fs/btrfs/Makefile | 1 +
> scripts/Makefile.extrawarn | 1 +
> 10 files changed, 15 insertions(+), 13 deletions(-)
>
> diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> index ec474a70a02f..5fc9160ca1fa 100644
> --- a/Documentation/process/programming-language.rst
> +++ b/Documentation/process/programming-language.rst
> @@ -5,9 +5,9 @@ Programming Language
>
> The kernel is written in the C programming language [c-language]_.
> More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> -(including some C99 features). ``clang`` [clang]_ is also supported, see
> -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> +``clang`` [clang]_ is also supported, see docs on
> +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> This dialect contains many extensions to the language [gnu-extensions]_,
> and many of them are used within the kernel as a matter of course.
> diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> index 41db2598ce11..c1a9b481a6f9 100644
> --- a/Documentation/translations/it_IT/process/programming-language.rst
> +++ b/Documentation/translations/it_IT/process/programming-language.rst
> @@ -10,8 +10,8 @@ Linguaggio di programmazione
>
> Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> +dello standard ISO C11.
> Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> index 2a47a1d2ec20..fabdc338dbfb 100644
> --- a/Documentation/translations/zh_CN/process/programming-language.rst
> +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> @@ -9,8 +9,7 @@
> ============
>
> 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
>
> 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
>
> diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> index 54e3699eadf8..144bdaf81a41 100644
> --- a/Documentation/translations/zh_TW/process/programming-language.rst
> +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> @@ -12,8 +12,7 @@
> ============
>
> 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
>
> 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
>
> diff --git a/Makefile b/Makefile
> index 289ce2be8032..94fa9a849a7a 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> -Werror=implicit-function-declaration -Werror=implicit-int \
> -Werror=return-type -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> KBUILD_CPPFLAGS := -D__KERNEL__
> KBUILD_AFLAGS_KERNEL :=
> KBUILD_CFLAGS_KERNEL :=
> @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
>
> ifdef CONFIG_CC_IS_CLANG
> KBUILD_CPPFLAGS += -Qunused-arguments
> -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> KBUILD_CFLAGS += -Wno-gnu
> # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 6c01b63ff56d..9378ea055bf2 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> index 1b62b9f65196..1618a6e0af4e 100644
> --- a/drivers/gpu/drm/i915/Makefile
> +++ b/drivers/gpu/drm/i915/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> subdir-ccflags-y += -Wno-type-limits
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> +subdir-ccflags-y += -Wno-shift-negative-value
> subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> index ad0ae8053b79..a3bbd73171f2 100644
> --- a/drivers/staging/greybus/tools/Makefile
> +++ b/drivers/staging/greybus/tools/Makefile
> @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> -Wredundant-decls \
> -Wcast-align \
> -Wsign-compare \
> - -Wno-missing-field-initializers
> + -Wno-missing-field-initializers \
> + -Wno-shift-negative-value
>
> CC := $(CROSS_COMPILE)gcc
>
> diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
> index 4188ba3fd8c3..99f9995670ea 100644
> --- a/fs/btrfs/Makefile
> +++ b/fs/btrfs/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> subdir-ccflags-y += -Wno-type-limits
> +subdir-ccflags-y += -Wno-shift-negative-value
>
> obj-$(CONFIG_BTRFS_FS) := btrfs.o
>
> diff --git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
> index 8be892887d71..650d0b8ceec3 100644
> --- a/scripts/Makefile.extrawarn
> +++ b/scripts/Makefile.extrawarn
> @@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
> KBUILD_CFLAGS += -Wno-missing-field-initializers
> KBUILD_CFLAGS += -Wno-sign-compare
> KBUILD_CFLAGS += -Wno-type-limits
> +KBUILD_CFLAGS += -Wno-shift-negative-value
>
> KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
>
> --
> 2.29.2
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
` (2 preceding siblings ...)
2022-03-03 0:44 ` Masahiro Yamada
@ 2022-03-04 11:29 ` Sedat Dilek
2022-03-06 10:03 ` Sedat Dilek
3 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 11:29 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Tue, Mar 1, 2022 at 4:59 PM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Mark Rutland <mark.rutland@arm.com>
>
> In a subsequent patch we'll move the kernel from using `-std=gnu89` to
> `-std=gnu11`, permitting the use of additional C11 features such as
> for-loop initial declarations.
>
> One contentious aspect of C99 is that it permits mixed declarations and
> code, and for now at least, it seems preferable to enforce that
> declarations must come first.
>
> These warnings were already disabled in the kernel itself, but not
> for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> a separate set of CFLAGS.
>
> This patch fixes an existing violation in modpost.c, which is not
> reported because of the missing flag in KBUILD_USERCFLAGS:
>
> | scripts/mod/modpost.c: In function ‘match’:
> | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> | 837 | const char *endp = p + strlen(p) - 1;
> | | ^~~~~
>
> Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> [arnd: don't add a duplicate flag to the default set, update changelog]
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
I was able to build and boot on bare metal.
No new warnings in my build-log here after switching to -std=gnu11.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
- sed@ -
> ---
> Makefile | 3 ++-
> arch/arm64/kernel/vdso32/Makefile | 1 +
> scripts/mod/modpost.c | 4 +++-
> 3 files changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/Makefile b/Makefile
> index 94fa9a849a7a..37ef6a555dcd 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -432,7 +432,8 @@ HOSTCXX = g++
> endif
>
> export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> - -O2 -fomit-frame-pointer -std=gnu89
> + -O2 -fomit-frame-pointer -std=gnu89 \
> + -Wdeclaration-after-statement
> export KBUILD_USERLDFLAGS :=
>
> KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 9378ea055bf2..ed181bedbffc 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> + -Wdeclaration-after-statement \
> -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> index 6bfa33217914..fe693304b120 100644
> --- a/scripts/mod/modpost.c
> +++ b/scripts/mod/modpost.c
> @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> {
> const char *p;
> while (*pat) {
> + const char *endp;
> +
> p = *pat++;
> - const char *endp = p + strlen(p) - 1;
> + endp = p + strlen(p) - 1;
>
> /* "*foo*" */
> if (*p == '*' && *endp == '*') {
> --
> 2.29.2
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
` (3 preceding siblings ...)
2022-03-04 11:24 ` Sedat Dilek
@ 2022-03-04 11:37 ` Sedat Dilek
2022-03-04 16:25 ` Sedat Dilek
5 siblings, 0 replies; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 11:37 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Wed, Mar 2, 2022 at 5:29 PM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Arnd Bergmann <arnd@arndb.de>
>
> During a patch discussion, Linus brought up the option of changing
> the C standard version from gnu89 to gnu99, which allows using variable
> declaration inside of a for() loop. While the C99, C11 and later standards
> introduce many other features, most of these are already available in
> gnu89 as GNU extensions as well.
>
> An earlier attempt to do this when gcc-5 started defaulting to
> -std=gnu11 failed because at the time that caused warnings about
> designated initializers with older compilers. Now that gcc-5.1 is
> the minimum compiler version used for building kernels, that is no
> longer a concern. Similarly, the behavior of 'inline' functions changes
> between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> behavior, but this was taken care of by defining 'inline' to include
> __attribute__((gnu_inline)) in order to allow building with clang a
> while ago.
>
> One minor issue that remains is an added gcc warning for shifts of
> negative integers when building with -Wextra, which happens with the
> 'make W=1' option, as well as for three drivers in the kernel that always
> enable -Wextra, but it was only observed with the i915 driver so far.
> To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> in a Makefile.
>
> Nathan Chancellor reported an additional -Wdeclaration-after-statement
> warning that appears in a system header on arm, this still needs a
> workaround.
>
> The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> minimal and mainly impact warnings at the -Wpedantic level that the
> kernel never enables. Between these, gnu11 is the newest version
> that is supported by all supported compiler versions, though it is
> only the default on gcc-5, while all other supported versions of
> gcc or clang default to gnu1x/gnu17.
>
> Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> Acked-by: Marco Elver <elver@google.com>
> Acked-by: Jani Nikula <jani.nikula@intel.com>
> Acked-by: David Sterba <dsterba@suse.com>
> Reviewed-by: Alex Shi <alexs@kernel.org>
> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> Cc: Masahiro Yamada <masahiroy@kernel.org>
> Cc: Mark Rutland <mark.rutland@arm.com>
> Cc: linux-kbuild@vger.kernel.org
> Cc: llvm@lists.linux.dev
> Cc: linux-doc@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
> ---
Arnd, please CC me on further patches/patchsets.
Thanks.
- Sedat -
> [v3]
> - split out USERCFLAGS to a separate patch
> - add -Wdeclaration-after-statement patch from Mark Rutland
> - leave out C17 reference
> - more rewording the descrption
>
> [v2]
> - added -std=gnu11 back, rather than just relying on the default
> - minor changes to changelog text
> ---
> Documentation/process/programming-language.rst | 6 +++---
> .../translations/it_IT/process/programming-language.rst | 4 ++--
> .../translations/zh_CN/process/programming-language.rst | 3 +--
> .../translations/zh_TW/process/programming-language.rst | 3 +--
> Makefile | 4 ++--
> arch/arm64/kernel/vdso32/Makefile | 2 +-
> drivers/gpu/drm/i915/Makefile | 1 +
> drivers/staging/greybus/tools/Makefile | 3 ++-
> fs/btrfs/Makefile | 1 +
> scripts/Makefile.extrawarn | 1 +
> 10 files changed, 15 insertions(+), 13 deletions(-)
>
> diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> index ec474a70a02f..5fc9160ca1fa 100644
> --- a/Documentation/process/programming-language.rst
> +++ b/Documentation/process/programming-language.rst
> @@ -5,9 +5,9 @@ Programming Language
>
> The kernel is written in the C programming language [c-language]_.
> More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> -(including some C99 features). ``clang`` [clang]_ is also supported, see
> -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> +``clang`` [clang]_ is also supported, see docs on
> +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> This dialect contains many extensions to the language [gnu-extensions]_,
> and many of them are used within the kernel as a matter of course.
> diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> index 41db2598ce11..c1a9b481a6f9 100644
> --- a/Documentation/translations/it_IT/process/programming-language.rst
> +++ b/Documentation/translations/it_IT/process/programming-language.rst
> @@ -10,8 +10,8 @@ Linguaggio di programmazione
>
> Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> +dello standard ISO C11.
> Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> index 2a47a1d2ec20..fabdc338dbfb 100644
> --- a/Documentation/translations/zh_CN/process/programming-language.rst
> +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> @@ -9,8 +9,7 @@
> ============
>
> 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
>
> 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
>
> diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> index 54e3699eadf8..144bdaf81a41 100644
> --- a/Documentation/translations/zh_TW/process/programming-language.rst
> +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> @@ -12,8 +12,7 @@
> ============
>
> 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
>
> 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
>
> diff --git a/Makefile b/Makefile
> index 289ce2be8032..94fa9a849a7a 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> -Werror=implicit-function-declaration -Werror=implicit-int \
> -Werror=return-type -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> KBUILD_CPPFLAGS := -D__KERNEL__
> KBUILD_AFLAGS_KERNEL :=
> KBUILD_CFLAGS_KERNEL :=
> @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
>
> ifdef CONFIG_CC_IS_CLANG
> KBUILD_CPPFLAGS += -Qunused-arguments
> -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> KBUILD_CFLAGS += -Wno-gnu
> # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 6c01b63ff56d..9378ea055bf2 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> index 1b62b9f65196..1618a6e0af4e 100644
> --- a/drivers/gpu/drm/i915/Makefile
> +++ b/drivers/gpu/drm/i915/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> subdir-ccflags-y += -Wno-type-limits
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> +subdir-ccflags-y += -Wno-shift-negative-value
> subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> index ad0ae8053b79..a3bbd73171f2 100644
> --- a/drivers/staging/greybus/tools/Makefile
> +++ b/drivers/staging/greybus/tools/Makefile
> @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> -Wredundant-decls \
> -Wcast-align \
> -Wsign-compare \
> - -Wno-missing-field-initializers
> + -Wno-missing-field-initializers \
> + -Wno-shift-negative-value
>
> CC := $(CROSS_COMPILE)gcc
>
> diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
> index 4188ba3fd8c3..99f9995670ea 100644
> --- a/fs/btrfs/Makefile
> +++ b/fs/btrfs/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> subdir-ccflags-y += -Wno-type-limits
> +subdir-ccflags-y += -Wno-shift-negative-value
>
> obj-$(CONFIG_BTRFS_FS) := btrfs.o
>
> diff --git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
> index 8be892887d71..650d0b8ceec3 100644
> --- a/scripts/Makefile.extrawarn
> +++ b/scripts/Makefile.extrawarn
> @@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
> KBUILD_CFLAGS += -Wno-missing-field-initializers
> KBUILD_CFLAGS += -Wno-sign-compare
> KBUILD_CFLAGS += -Wno-type-limits
> +KBUILD_CFLAGS += -Wno-shift-negative-value
>
> KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
>
> --
> 2.29.2
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
` (4 preceding siblings ...)
2022-03-04 11:37 ` Sedat Dilek
@ 2022-03-04 16:25 ` Sedat Dilek
2022-03-06 15:31 ` Sedat Dilek
5 siblings, 1 reply; 34+ messages in thread
From: Sedat Dilek @ 2022-03-04 16:25 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Wed, Mar 2, 2022 at 5:29 PM Arnd Bergmann <arnd@kernel.org> wrote:
>
> From: Arnd Bergmann <arnd@arndb.de>
>
> During a patch discussion, Linus brought up the option of changing
> the C standard version from gnu89 to gnu99, which allows using variable
> declaration inside of a for() loop. While the C99, C11 and later standards
> introduce many other features, most of these are already available in
> gnu89 as GNU extensions as well.
>
> An earlier attempt to do this when gcc-5 started defaulting to
> -std=gnu11 failed because at the time that caused warnings about
> designated initializers with older compilers. Now that gcc-5.1 is
> the minimum compiler version used for building kernels, that is no
> longer a concern. Similarly, the behavior of 'inline' functions changes
> between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> behavior, but this was taken care of by defining 'inline' to include
> __attribute__((gnu_inline)) in order to allow building with clang a
> while ago.
>
> One minor issue that remains is an added gcc warning for shifts of
> negative integers when building with -Wextra, which happens with the
> 'make W=1' option, as well as for three drivers in the kernel that always
> enable -Wextra, but it was only observed with the i915 driver so far.
> To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> in a Makefile.
>
> Nathan Chancellor reported an additional -Wdeclaration-after-statement
> warning that appears in a system header on arm, this still needs a
> workaround.
>
> The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> minimal and mainly impact warnings at the -Wpedantic level that the
> kernel never enables. Between these, gnu11 is the newest version
> that is supported by all supported compiler versions, though it is
> only the default on gcc-5, while all other supported versions of
> gcc or clang default to gnu1x/gnu17.
>
> Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> Acked-by: Marco Elver <elver@google.com>
> Acked-by: Jani Nikula <jani.nikula@intel.com>
> Acked-by: David Sterba <dsterba@suse.com>
> Reviewed-by: Alex Shi <alexs@kernel.org>
> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> Cc: Masahiro Yamada <masahiroy@kernel.org>
> Cc: Mark Rutland <mark.rutland@arm.com>
> Cc: linux-kbuild@vger.kernel.org
> Cc: llvm@lists.linux.dev
> Cc: linux-doc@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
When I saw the first patches in this area, I was thinking what about
the tools/ build-system?
This ECO system has its own rules.
I use CONFIG_DEBUG_INFO_BTF=y in my kernels which means
tools/bpf/resolve_btfids will be built.
This uses hardcoded -std=gnu89.
$ git grep 'std=gnu89' tools/
tools/lib/bpf/Makefile:override CFLAGS += -std=gnu89
tools/testing/selftests/sync/Makefile:CFLAGS += -O2 -g -std=gnu89
-pthread -Wall -Wextra
Furthermore, we have several places using C99 which can be replaced by C11 now.
$ git grep 'std=gnu99' tools/ | wc -l
20
We already have C11 in tools/:
$ git grep 'std=gnu11' tools/
tools/testing/selftests/wireguard/qemu/Makefile: $(MUSL_CC) -o
$@ $(CFLAGS) $(LDFLAGS) -std=gnu11 $<
What about having a central place where we define the
STD_GNU_C_VERSION (as a suggestion)?
This might be helpful for people dealing with diverse C version standards.
Also with STD_GNU_CXX_VERSION which is used AFAICS only in tools/:
$ git grep 'std=gnu++' tools/
tools/build/feature/Makefile: $(BUILDXX) -std=gnu++11
tools/build/feature/Makefile: $(BUILDXX) -std=gnu++14
\
tools/build/feature/Makefile: $(BUILDXX) -std=gnu++14
\
tools/build/feature/Makefile: $(BUILDXX) -std=gnu++14
\
tools/perf/Makefile.config:CXXFLAGS += -std=gnu++14 -fno-exceptions -fno-rtti
Looks like one place should be -std=gnu++14.
( I had no deeper look. No testing. )
Just some thoughts.
- Sedat -
> ---
> [v3]
> - split out USERCFLAGS to a separate patch
> - add -Wdeclaration-after-statement patch from Mark Rutland
> - leave out C17 reference
> - more rewording the descrption
>
> [v2]
> - added -std=gnu11 back, rather than just relying on the default
> - minor changes to changelog text
> ---
> Documentation/process/programming-language.rst | 6 +++---
> .../translations/it_IT/process/programming-language.rst | 4 ++--
> .../translations/zh_CN/process/programming-language.rst | 3 +--
> .../translations/zh_TW/process/programming-language.rst | 3 +--
> Makefile | 4 ++--
> arch/arm64/kernel/vdso32/Makefile | 2 +-
> drivers/gpu/drm/i915/Makefile | 1 +
> drivers/staging/greybus/tools/Makefile | 3 ++-
> fs/btrfs/Makefile | 1 +
> scripts/Makefile.extrawarn | 1 +
> 10 files changed, 15 insertions(+), 13 deletions(-)
>
> diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> index ec474a70a02f..5fc9160ca1fa 100644
> --- a/Documentation/process/programming-language.rst
> +++ b/Documentation/process/programming-language.rst
> @@ -5,9 +5,9 @@ Programming Language
>
> The kernel is written in the C programming language [c-language]_.
> More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> -(including some C99 features). ``clang`` [clang]_ is also supported, see
> -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> +``clang`` [clang]_ is also supported, see docs on
> +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> This dialect contains many extensions to the language [gnu-extensions]_,
> and many of them are used within the kernel as a matter of course.
> diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> index 41db2598ce11..c1a9b481a6f9 100644
> --- a/Documentation/translations/it_IT/process/programming-language.rst
> +++ b/Documentation/translations/it_IT/process/programming-language.rst
> @@ -10,8 +10,8 @@ Linguaggio di programmazione
>
> Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> +dello standard ISO C11.
> Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
>
> diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> index 2a47a1d2ec20..fabdc338dbfb 100644
> --- a/Documentation/translations/zh_CN/process/programming-language.rst
> +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> @@ -9,8 +9,7 @@
> ============
>
> 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
>
> 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
>
> diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> index 54e3699eadf8..144bdaf81a41 100644
> --- a/Documentation/translations/zh_TW/process/programming-language.rst
> +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> @@ -12,8 +12,7 @@
> ============
>
> 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> -包括一些C99特性)
> +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
>
> 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
>
> diff --git a/Makefile b/Makefile
> index 289ce2be8032..94fa9a849a7a 100644
> --- a/Makefile
> +++ b/Makefile
> @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> -Werror=implicit-function-declaration -Werror=implicit-int \
> -Werror=return-type -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> KBUILD_CPPFLAGS := -D__KERNEL__
> KBUILD_AFLAGS_KERNEL :=
> KBUILD_CFLAGS_KERNEL :=
> @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
>
> ifdef CONFIG_CC_IS_CLANG
> KBUILD_CPPFLAGS += -Qunused-arguments
> -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> KBUILD_CFLAGS += -Wno-gnu
> # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> index 6c01b63ff56d..9378ea055bf2 100644
> --- a/arch/arm64/kernel/vdso32/Makefile
> +++ b/arch/arm64/kernel/vdso32/Makefile
> @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> -fno-strict-aliasing -fno-common \
> -Werror-implicit-function-declaration \
> -Wno-format-security \
> - -std=gnu89
> + -std=gnu11
> VDSO_CFLAGS += -O2
> # Some useful compiler-dependent flags from top-level Makefile
> VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> index 1b62b9f65196..1618a6e0af4e 100644
> --- a/drivers/gpu/drm/i915/Makefile
> +++ b/drivers/gpu/drm/i915/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> subdir-ccflags-y += -Wno-type-limits
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> +subdir-ccflags-y += -Wno-shift-negative-value
> subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> index ad0ae8053b79..a3bbd73171f2 100644
> --- a/drivers/staging/greybus/tools/Makefile
> +++ b/drivers/staging/greybus/tools/Makefile
> @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> -Wredundant-decls \
> -Wcast-align \
> -Wsign-compare \
> - -Wno-missing-field-initializers
> + -Wno-missing-field-initializers \
> + -Wno-shift-negative-value
>
> CC := $(CROSS_COMPILE)gcc
>
> diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
> index 4188ba3fd8c3..99f9995670ea 100644
> --- a/fs/btrfs/Makefile
> +++ b/fs/btrfs/Makefile
> @@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
> subdir-ccflags-y += -Wno-missing-field-initializers
> subdir-ccflags-y += -Wno-sign-compare
> subdir-ccflags-y += -Wno-type-limits
> +subdir-ccflags-y += -Wno-shift-negative-value
>
> obj-$(CONFIG_BTRFS_FS) := btrfs.o
>
> diff --git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
> index 8be892887d71..650d0b8ceec3 100644
> --- a/scripts/Makefile.extrawarn
> +++ b/scripts/Makefile.extrawarn
> @@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
> KBUILD_CFLAGS += -Wno-missing-field-initializers
> KBUILD_CFLAGS += -Wno-sign-compare
> KBUILD_CFLAGS += -Wno-type-limits
> +KBUILD_CFLAGS += -Wno-shift-negative-value
>
> KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
>
> --
> 2.29.2
>
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-04 11:24 ` Sedat Dilek
@ 2022-03-06 10:01 ` Sedat Dilek
0 siblings, 0 replies; 34+ messages in thread
From: Sedat Dilek @ 2022-03-06 10:01 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 12:24 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Wed, Mar 2, 2022 at 5:29 PM Arnd Bergmann <arnd@kernel.org> wrote:
> >
> > From: Arnd Bergmann <arnd@arndb.de>
> >
> > During a patch discussion, Linus brought up the option of changing
> > the C standard version from gnu89 to gnu99, which allows using variable
> > declaration inside of a for() loop. While the C99, C11 and later standards
> > introduce many other features, most of these are already available in
> > gnu89 as GNU extensions as well.
> >
> > An earlier attempt to do this when gcc-5 started defaulting to
> > -std=gnu11 failed because at the time that caused warnings about
> > designated initializers with older compilers. Now that gcc-5.1 is
> > the minimum compiler version used for building kernels, that is no
> > longer a concern. Similarly, the behavior of 'inline' functions changes
> > between gnu89 using gnu_inline behavior and gnu11 using standard c99+
> > behavior, but this was taken care of by defining 'inline' to include
> > __attribute__((gnu_inline)) in order to allow building with clang a
> > while ago.
> >
> > One minor issue that remains is an added gcc warning for shifts of
> > negative integers when building with -Wextra, which happens with the
> > 'make W=1' option, as well as for three drivers in the kernel that always
> > enable -Wextra, but it was only observed with the i915 driver so far.
> > To be on the safe side, add -Wno-shift-negative-value to any -Wextra
> > in a Makefile.
> >
> > Nathan Chancellor reported an additional -Wdeclaration-after-statement
> > warning that appears in a system header on arm, this still needs a
> > workaround.
> >
> > The differences between gnu99, gnu11, gnu1x and gnu17 are fairly
> > minimal and mainly impact warnings at the -Wpedantic level that the
> > kernel never enables. Between these, gnu11 is the newest version
> > that is supported by all supported compiler versions, though it is
> > only the default on gcc-5, while all other supported versions of
> > gcc or clang default to gnu1x/gnu17.
> >
> > Link: https://lore.kernel.org/lkml/CAHk-=wiyCH7xeHcmiFJ-YgXUy2Jaj7pnkdKpcovt8fYbVFW3TA@mail.gmail.com/
> > Link: https://github.com/ClangBuiltLinux/linux/issues/1603
> > Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
> > Acked-by: Marco Elver <elver@google.com>
> > Acked-by: Jani Nikula <jani.nikula@intel.com>
> > Acked-by: David Sterba <dsterba@suse.com>
> > Reviewed-by: Alex Shi <alexs@kernel.org>
> > Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
> > Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
> > Cc: Masahiro Yamada <masahiroy@kernel.org>
> > Cc: Mark Rutland <mark.rutland@arm.com>
> > Cc: linux-kbuild@vger.kernel.org
> > Cc: llvm@lists.linux.dev
> > Cc: linux-doc@vger.kernel.org
> > Cc: linux-kernel@vger.kernel.org
> > Signed-off-by: Arnd Bergmann <arnd@arndb.de>
> > ---
> > [v3]
> > - split out USERCFLAGS to a separate patch
> > - add -Wdeclaration-after-statement patch from Mark Rutland
> > - leave out C17 reference
> > - more rewording the descrption
> >
>
> I was able to build and boot on bare metal.
>
> No new warnings in my build-log here after switching to -std=gnu11.
>
> Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
>
I have re-tested with Debian's LLVM/Clang v14.0.0-rc2.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v14.0.0-rc2 (x86-64)
- sed@ -
> - sed@ -
>
> > [v2]
> > - added -std=gnu11 back, rather than just relying on the default
> > - minor changes to changelog text
> > ---
> > Documentation/process/programming-language.rst | 6 +++---
> > .../translations/it_IT/process/programming-language.rst | 4 ++--
> > .../translations/zh_CN/process/programming-language.rst | 3 +--
> > .../translations/zh_TW/process/programming-language.rst | 3 +--
> > Makefile | 4 ++--
> > arch/arm64/kernel/vdso32/Makefile | 2 +-
> > drivers/gpu/drm/i915/Makefile | 1 +
> > drivers/staging/greybus/tools/Makefile | 3 ++-
> > fs/btrfs/Makefile | 1 +
> > scripts/Makefile.extrawarn | 1 +
> > 10 files changed, 15 insertions(+), 13 deletions(-)
> >
> > diff --git a/Documentation/process/programming-language.rst b/Documentation/process/programming-language.rst
> > index ec474a70a02f..5fc9160ca1fa 100644
> > --- a/Documentation/process/programming-language.rst
> > +++ b/Documentation/process/programming-language.rst
> > @@ -5,9 +5,9 @@ Programming Language
> >
> > The kernel is written in the C programming language [c-language]_.
> > More precisely, the kernel is typically compiled with ``gcc`` [gcc]_
> > -under ``-std=gnu89`` [gcc-c-dialect-options]_: the GNU dialect of ISO C90
> > -(including some C99 features). ``clang`` [clang]_ is also supported, see
> > -docs on :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> > +under ``-std=gnu11`` [gcc-c-dialect-options]_: the GNU dialect of ISO C11.
> > +``clang`` [clang]_ is also supported, see docs on
> > +:ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> >
> > This dialect contains many extensions to the language [gnu-extensions]_,
> > and many of them are used within the kernel as a matter of course.
> > diff --git a/Documentation/translations/it_IT/process/programming-language.rst b/Documentation/translations/it_IT/process/programming-language.rst
> > index 41db2598ce11..c1a9b481a6f9 100644
> > --- a/Documentation/translations/it_IT/process/programming-language.rst
> > +++ b/Documentation/translations/it_IT/process/programming-language.rst
> > @@ -10,8 +10,8 @@ Linguaggio di programmazione
> >
> > Il kernel è scritto nel linguaggio di programmazione C [it-c-language]_.
> > Più precisamente, il kernel viene compilato con ``gcc`` [it-gcc]_ usando
> > -l'opzione ``-std=gnu89`` [it-gcc-c-dialect-options]_: il dialetto GNU
> > -dello standard ISO C90 (con l'aggiunta di alcune funzionalità da C99).
> > +l'opzione ``-std=gnu11`` [it-gcc-c-dialect-options]_: il dialetto GNU
> > +dello standard ISO C11.
> > Linux supporta anche ``clang`` [it-clang]_, leggete la documentazione
> > :ref:`Building Linux with Clang/LLVM <kbuild_llvm>`.
> >
> > diff --git a/Documentation/translations/zh_CN/process/programming-language.rst b/Documentation/translations/zh_CN/process/programming-language.rst
> > index 2a47a1d2ec20..fabdc338dbfb 100644
> > --- a/Documentation/translations/zh_CN/process/programming-language.rst
> > +++ b/Documentation/translations/zh_CN/process/programming-language.rst
> > @@ -9,8 +9,7 @@
> > ============
> >
> > 内核是用C语言 :ref:`c-language <cn_c-language>` 编写的。更准确地说,内核通常是用 :ref:`gcc <cn_gcc>`
> > -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C90的 GNU 方言(
> > -包括一些C99特性)
> > +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <cn_gcc-c-dialect-options>` 下编译的:ISO C11的 GNU 方言
> >
> > 这种方言包含对语言 :ref:`gnu-extensions <cn_gnu-extensions>` 的许多扩展,当然,它们许多都在内核中使用。
> >
> > diff --git a/Documentation/translations/zh_TW/process/programming-language.rst b/Documentation/translations/zh_TW/process/programming-language.rst
> > index 54e3699eadf8..144bdaf81a41 100644
> > --- a/Documentation/translations/zh_TW/process/programming-language.rst
> > +++ b/Documentation/translations/zh_TW/process/programming-language.rst
> > @@ -12,8 +12,7 @@
> > ============
> >
> > 內核是用C語言 :ref:`c-language <tw_c-language>` 編寫的。更準確地說,內核通常是用 :ref:`gcc <tw_gcc>`
> > -在 ``-std=gnu89`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C90的 GNU 方言(
> > -包括一些C99特性)
> > +在 ``-std=gnu11`` :ref:`gcc-c-dialect-options <tw_gcc-c-dialect-options>` 下編譯的:ISO C11的 GNU 方言
> >
> > 這種方言包含對語言 :ref:`gnu-extensions <tw_gnu-extensions>` 的許多擴展,當然,它們許多都在內核中使用。
> >
> > diff --git a/Makefile b/Makefile
> > index 289ce2be8032..94fa9a849a7a 100644
> > --- a/Makefile
> > +++ b/Makefile
> > @@ -515,7 +515,7 @@ KBUILD_CFLAGS := -Wall -Wundef -Werror=strict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common -fshort-wchar -fno-PIE \
> > -Werror=implicit-function-declaration -Werror=implicit-int \
> > -Werror=return-type -Wno-format-security \
> > - -std=gnu89
> > + -std=gnu11
> > KBUILD_CPPFLAGS := -D__KERNEL__
> > KBUILD_AFLAGS_KERNEL :=
> > KBUILD_CFLAGS_KERNEL :=
> > @@ -782,7 +782,7 @@ KBUILD_CFLAGS += $(KBUILD_CFLAGS-y) $(CONFIG_CC_IMPLICIT_FALLTHROUGH)
> >
> > ifdef CONFIG_CC_IS_CLANG
> > KBUILD_CPPFLAGS += -Qunused-arguments
> > -# The kernel builds with '-std=gnu89' so use of GNU extensions is acceptable.
> > +# The kernel builds with '-std=gnu11' so use of GNU extensions is acceptable.
> > KBUILD_CFLAGS += -Wno-gnu
> > # CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
> > # source of a reference will be _MergedGlobals and not on of the whitelisted names.
> > diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> > index 6c01b63ff56d..9378ea055bf2 100644
> > --- a/arch/arm64/kernel/vdso32/Makefile
> > +++ b/arch/arm64/kernel/vdso32/Makefile
> > @@ -68,7 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common \
> > -Werror-implicit-function-declaration \
> > -Wno-format-security \
> > - -std=gnu89
> > + -std=gnu11
> > VDSO_CFLAGS += -O2
> > # Some useful compiler-dependent flags from top-level Makefile
> > VDSO_CFLAGS += $(call cc32-option,-Wdeclaration-after-statement,)
> > diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
> > index 1b62b9f65196..1618a6e0af4e 100644
> > --- a/drivers/gpu/drm/i915/Makefile
> > +++ b/drivers/gpu/drm/i915/Makefile
> > @@ -17,6 +17,7 @@ subdir-ccflags-y += -Wno-unused-parameter
> > subdir-ccflags-y += -Wno-type-limits
> > subdir-ccflags-y += -Wno-missing-field-initializers
> > subdir-ccflags-y += -Wno-sign-compare
> > +subdir-ccflags-y += -Wno-shift-negative-value
> > subdir-ccflags-y += $(call cc-disable-warning, unused-but-set-variable)
> > subdir-ccflags-y += $(call cc-disable-warning, frame-address)
> > subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
> > diff --git a/drivers/staging/greybus/tools/Makefile b/drivers/staging/greybus/tools/Makefile
> > index ad0ae8053b79..a3bbd73171f2 100644
> > --- a/drivers/staging/greybus/tools/Makefile
> > +++ b/drivers/staging/greybus/tools/Makefile
> > @@ -12,7 +12,8 @@ CFLAGS += -std=gnu99 -Wall -Wextra -g \
> > -Wredundant-decls \
> > -Wcast-align \
> > -Wsign-compare \
> > - -Wno-missing-field-initializers
> > + -Wno-missing-field-initializers \
> > + -Wno-shift-negative-value
> >
> > CC := $(CROSS_COMPILE)gcc
> >
> > diff --git a/fs/btrfs/Makefile b/fs/btrfs/Makefile
> > index 4188ba3fd8c3..99f9995670ea 100644
> > --- a/fs/btrfs/Makefile
> > +++ b/fs/btrfs/Makefile
> > @@ -17,6 +17,7 @@ subdir-ccflags-y += $(condflags)
> > subdir-ccflags-y += -Wno-missing-field-initializers
> > subdir-ccflags-y += -Wno-sign-compare
> > subdir-ccflags-y += -Wno-type-limits
> > +subdir-ccflags-y += -Wno-shift-negative-value
> >
> > obj-$(CONFIG_BTRFS_FS) := btrfs.o
> >
> > diff --git a/scripts/Makefile.extrawarn b/scripts/Makefile.extrawarn
> > index 8be892887d71..650d0b8ceec3 100644
> > --- a/scripts/Makefile.extrawarn
> > +++ b/scripts/Makefile.extrawarn
> > @@ -36,6 +36,7 @@ KBUILD_CFLAGS += $(call cc-option, -Wstringop-truncation)
> > KBUILD_CFLAGS += -Wno-missing-field-initializers
> > KBUILD_CFLAGS += -Wno-sign-compare
> > KBUILD_CFLAGS += -Wno-type-limits
> > +KBUILD_CFLAGS += -Wno-shift-negative-value
> >
> > KBUILD_CPPFLAGS += -DKBUILD_EXTRA_WARN1
> >
> > --
> > 2.29.2
> >
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 2/3] treewide: use -Wdeclaration-after-statement
2022-03-04 11:29 ` Sedat Dilek
@ 2022-03-06 10:03 ` Sedat Dilek
0 siblings, 0 replies; 34+ messages in thread
From: Sedat Dilek @ 2022-03-06 10:03 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 12:29 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Tue, Mar 1, 2022 at 4:59 PM Arnd Bergmann <arnd@kernel.org> wrote:
> >
> > From: Mark Rutland <mark.rutland@arm.com>
> >
> > In a subsequent patch we'll move the kernel from using `-std=gnu89` to
> > `-std=gnu11`, permitting the use of additional C11 features such as
> > for-loop initial declarations.
> >
> > One contentious aspect of C99 is that it permits mixed declarations and
> > code, and for now at least, it seems preferable to enforce that
> > declarations must come first.
> >
> > These warnings were already disabled in the kernel itself, but not
> > for KBUILD_USERCFLAGS or the compat VDSO on arch/arm64, which uses
> > a separate set of CFLAGS.
> >
> > This patch fixes an existing violation in modpost.c, which is not
> > reported because of the missing flag in KBUILD_USERCFLAGS:
> >
> > | scripts/mod/modpost.c: In function ‘match’:
> > | scripts/mod/modpost.c:837:3: warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]
> > | 837 | const char *endp = p + strlen(p) - 1;
> > | | ^~~~~
> >
> > Signed-off-by: Mark Rutland <mark.rutland@arm.com>
> > [arnd: don't add a duplicate flag to the default set, update changelog]
> > Signed-off-by: Arnd Bergmann <arnd@arndb.de>
>
> I was able to build and boot on bare metal.
>
> No new warnings in my build-log here after switching to -std=gnu11.
>
> Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
>
I have re-tested with Debian's LLVM/Clang v14.0.0-rc2.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v14.0.0-rc2 (x86-64)
- sed@ -
> - sed@ -
>
> > ---
> > Makefile | 3 ++-
> > arch/arm64/kernel/vdso32/Makefile | 1 +
> > scripts/mod/modpost.c | 4 +++-
> > 3 files changed, 6 insertions(+), 2 deletions(-)
> >
> > diff --git a/Makefile b/Makefile
> > index 94fa9a849a7a..37ef6a555dcd 100644
> > --- a/Makefile
> > +++ b/Makefile
> > @@ -432,7 +432,8 @@ HOSTCXX = g++
> > endif
> >
> > export KBUILD_USERCFLAGS := -Wall -Wmissing-prototypes -Wstrict-prototypes \
> > - -O2 -fomit-frame-pointer -std=gnu89
> > + -O2 -fomit-frame-pointer -std=gnu89 \
> > + -Wdeclaration-after-statement
> > export KBUILD_USERLDFLAGS :=
> >
> > KBUILD_HOSTCFLAGS := $(KBUILD_USERCFLAGS) $(HOST_LFS_CFLAGS) $(HOSTCFLAGS)
> > diff --git a/arch/arm64/kernel/vdso32/Makefile b/arch/arm64/kernel/vdso32/Makefile
> > index 9378ea055bf2..ed181bedbffc 100644
> > --- a/arch/arm64/kernel/vdso32/Makefile
> > +++ b/arch/arm64/kernel/vdso32/Makefile
> > @@ -68,6 +68,7 @@ VDSO_CFLAGS += -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
> > -fno-strict-aliasing -fno-common \
> > -Werror-implicit-function-declaration \
> > -Wno-format-security \
> > + -Wdeclaration-after-statement \
> > -std=gnu11
> > VDSO_CFLAGS += -O2
> > # Some useful compiler-dependent flags from top-level Makefile
> > diff --git a/scripts/mod/modpost.c b/scripts/mod/modpost.c
> > index 6bfa33217914..fe693304b120 100644
> > --- a/scripts/mod/modpost.c
> > +++ b/scripts/mod/modpost.c
> > @@ -833,8 +833,10 @@ static int match(const char *sym, const char * const pat[])
> > {
> > const char *p;
> > while (*pat) {
> > + const char *endp;
> > +
> > p = *pat++;
> > - const char *endp = p + strlen(p) - 1;
> > + endp = p + strlen(p) - 1;
> >
> > /* "*foo*" */
> > if (*p == '*' && *endp == '*') {
> > --
> > 2.29.2
> >
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS
2022-03-04 11:12 ` Sedat Dilek
@ 2022-03-06 10:04 ` Sedat Dilek
0 siblings, 0 replies; 34+ messages in thread
From: Sedat Dilek @ 2022-03-06 10:04 UTC (permalink / raw)
To: Nathan Chancellor
Cc: Nick Desaulniers, Arnd Bergmann, Masahiro Yamada, Arnd Bergmann,
Linus Torvalds, Marco Elver, Jani Nikula, David Sterba, Alex Shi,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 12:12 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
>
> On Fri, Mar 4, 2022 at 8:18 AM Sedat Dilek <sedat.dilek@gmail.com> wrote:
> >
> > On Fri, Mar 4, 2022 at 7:47 AM Sedat Dilek <sedat.dilek@gmail.com> wrote:
> > >
> > > On Thu, Mar 3, 2022 at 6:37 PM Nathan Chancellor <nathan@kernel.org> wrote:
> > > >
> > > > Hi Sedat,
> > > >
> > > > On Thu, Mar 03, 2022 at 07:26:05AM +0100, Sedat Dilek wrote:
> > > > > Hey Nick!
> > > > >
> > > > > This only applies 1/3.
> > > > >
> > > > > $ b4 --version
> > > > > 0.8.0
> > > > >
> > > > > $ b4 am https://lore.kernel.org/lkml/20220301145233.3689119-1-arnd@kernel.org/
> > > > > -o - | git am -3
> > > > > Analyzing 14 messages in the thread
> > > > > Will use the latest revision: v3
> > > > > You can pick other revisions using the -vN flag
> > > > > Checking attestation on all messages, may take a moment...
> > > > > ---
> > > > > ✓ [PATCH v3 1/3] Kbuild: move to -std=gnu11
> > > > > ✓ Signed: DKIM/kernel.org
> > > > > + Reviewed-by: Nathan Chancellor <nathan@kernel.org> (✓ DKIM/kernel.org)
> > > > > ERROR: missing [2/3]!
> > > > > ERROR: missing [3/3]!
> > > > > ---
> > > > > NOTE: install patatt for end-to-end signature verification
> > > > > ---
> > > > > Total patches: 1
> > > > > ---
> > > > > WARNING: Thread incomplete!
> > > > > Link: https://lore.kernel.org/r/20220301145233.3689119-1-arnd@kernel.org
> > > > > Base: not specified
> > > > > Wende an: Kbuild: move to -std=gnu11
> > > >
> > > > It looks like the threading somehow got broken, likely due to the [v3]
> > > > on the first patch and not the second or third:
> > > >
> > > > This worked for me on v5.17-rc6:
> > > >
> > > > $ for i in $(seq 1 3); do b4 shazam -P _ 20220301145233.3689119-"$i"-arnd@kernel.org; done
> > > >
> > > > "b4 shazam" is the equivalent of "b4 am -o - ... | git am" and the
> > > > "-P _" tells b4 to only fetch that exact message ID, not the whole
> > > > thread.
> > > >
> > >
> > > Hmm, the universe is not good to me...
> > >
> > > $ for i in $(seq 1 3); do b4 shazam -P _
> > > 20220301145233.3689119-"$i"-arnd@kernel.org; done
> > > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> > > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> > > usage: b4 [-h] [--version] [-d] [-q] {mbox,am,attest,pr,ty,diff,kr} ...
> > > b4: error: argument subcmd: invalid choice: 'shazam' (choose from
> > > 'mbox', 'am', 'attest', 'pr', 'ty', 'diff', 'kr')
> > >
> > > Do I need a higher version of b4 (here: v0.8.0)?
> > >
> > > Check myself... b4.git:
> > >
> > > commit 7c1d044ff1d5235e598d4c777c4abfe60e0a09a8
> > > ("shazam: change default behaviour to be "apply-here"")
> > >
> > > ...is post-v0.8.0.
> > >
> >
> > I brutally applied the post-v0.8.0 patches stolen from b4.git over my
> > local distro b4 files.
> >
> > And was able to apply the triple:
> >
> > $ git log --oneline --no-merges
> > 5.17.0-rc6-1-amd64-clang13-lto..5.17.0-rc6-2-amd64-clang13-lto
> > 96a4222bdd4c (for-5.17/kbuild-std_gnu11-arndb-20220301) Kbuild: use
> > -std=gnu11 for KBUILD_USERCFLAGS
> > c4e8cef401a8 treewide: use -Wdeclaration-after-statement
> > 6a7cc105b238 Kbuild: move to -std=gnu11
> >
>
> I was able to build and boot on bare metal.
>
> No new warnings in my build-log here after switching to -std=gnu11.
>
> Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 x86-64
>
I have re-tested with Debian's LLVM/Clang v14.0.0-rc2.
Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v14.0.0-rc2 (x86-64)
- sed@ -
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
2022-03-04 16:25 ` Sedat Dilek
@ 2022-03-06 15:31 ` Sedat Dilek
0 siblings, 0 replies; 34+ messages in thread
From: Sedat Dilek @ 2022-03-06 15:31 UTC (permalink / raw)
To: Arnd Bergmann
Cc: Masahiro Yamada, Arnd Bergmann, Linus Torvalds, Marco Elver,
Jani Nikula, David Sterba, Alex Shi, Nick Desaulniers,
Miguel Ojeda, Mark Rutland, linux-kbuild, llvm, linux-doc,
linux-kernel
On Fri, Mar 4, 2022 at 5:25 PM Sedat Dilek <sedat.dilek@gmail.com> wrote:
[ ... ]
> When I saw the first patches in this area, I was thinking what about
> the tools/ build-system?
> This ECO system has its own rules.
>
My other goal was to build perf with my selfmade or distro LLVM/Clang
and -std=gnu11.
I was able to do so:
$ git log --oneline --no-merges v5.17-rc6..for-5.17/tools-std_gnu11-dileks-v2
2d99b1cfa897 (for-5.17/tools-std_gnu11-dileks-v2) perf: Use -std=gnu11
c345a183c4ef tools: libtraceevent: Use -std=gnu11
26f77082f233 tools: libsubcmd: Use -std=gnu11
aaba58ec81c8 tools: libbpf: Use -std=gnu11
ffc800af3be4 tools: libapi: Use -std=gnu11
For perf/libperl-support I needed an extra patch:
$ git log --oneline --no-merges
v5.17-rc6..for-5.17/perf-libperl_support-clang-dileks
316a1917ec05 (for-5.17/perf-libperl_support-clang-dileks) perf: Fix
libperl support with clang and perl v5.34
For details see [1].
I can send the patches if someone wants them.
[1] https://marc.info/?t=164646683300002&r=1&w=2
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-14 12:00 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-14 12:00 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 225635 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc8]
[cannot apply to masahiroy-kbuild/for-next srcres258-doc/doc-zh-tw next-20220310]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 13 days ago
:::::: commit date: 13 days ago
config: mips-randconfig-c004-20220302 (https://download.01.org/0day-ci/archive/20220314/202203141959.hlQJfKa4-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
fs/xfs/libxfs/xfs_dir2_leaf.c:1253:7: note: Assuming 'index' is < field 'count'
index < leafhdr->count &&
^~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1253:7: note: Left side of '&&' is true
fs/xfs/libxfs/xfs_dir2_leaf.c:1254:4: note: Assuming 'lep->hashval' is equal to 'args->hashval'
be32_to_cpu(lep->hashval) == args->hashval;
^
include/linux/byteorder/generic.h:95:21: note: expanded from macro 'be32_to_cpu'
#define be32_to_cpu __be32_to_cpu
^
include/uapi/linux/byteorder/big_endian.h:41:26: note: expanded from macro '__be32_to_cpu'
#define __be32_to_cpu(x) ((__force __u32)(__be32)(x))
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1252:2: note: Loop condition is true. Entering loop body
for (lep = &leafhdr->ents[index];
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1259:7: note: Assuming field 'address' is not equal to XFS_DIR2_NULL_DATAPTR
if (be32_to_cpu(lep->address) == XFS_DIR2_NULL_DATAPTR)
^
include/linux/byteorder/generic.h:95:21: note: expanded from macro 'be32_to_cpu'
#define be32_to_cpu __be32_to_cpu
^
include/uapi/linux/byteorder/big_endian.h:41:26: note: expanded from macro '__be32_to_cpu'
#define __be32_to_cpu(x) ((__force __u32)(__be32)(x))
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1259:3: note: Taking false branch
if (be32_to_cpu(lep->address) == XFS_DIR2_NULL_DATAPTR)
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1270:7: note: Assuming 'newdb' is equal to 'curdb'
if (newdb != curdb) {
^~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1270:3: note: Taking false branch
if (newdb != curdb) {
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1285:43: note: Access to field 'b_addr' results in a dereference of a null pointer (loaded from variable 'dbp')
dep = (xfs_dir2_data_entry_t *)((char *)dbp->b_addr +
^~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1462:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&bestsp[db - i], bestsp,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1462:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&bestsp[db - i], bestsp,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1643:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&bestsp[1], &bestsp[0], be32_to_cpu(ltp->bestcount) * sizeof(*bestsp));
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1643:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&bestsp[1], &bestsp[0], be32_to_cpu(ltp->bestcount) * sizeof(*bestsp));
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1785:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xfs_dir2_leaf_bests_p(ltp), freehdr.bests,
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1785:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(xfs_dir2_leaf_bests_p(ltp), freehdr.bests,
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
crypto/authenc.c:409:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authenc.c:409:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authenc.c:415:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authenc.c:415:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
crypto/authencesn.c:424:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:424:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (11 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> arch/mips/ath79/setup.c:185:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
^~~~~~~
arch/mips/ath79/setup.c:185:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
^~~~~~~
arch/mips/ath79/setup.c:188:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
^~~~~~~
arch/mips/ath79/setup.c:188:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
^~~~~~~
arch/mips/ath79/setup.c:191:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
^~~~~~~
arch/mips/ath79/setup.c:191:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
lib/kfifo.c:31:9: note: '?' condition is false
size = roundup_pow_of_two(size);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
lib/kfifo.c:31:9: note: Calling '__roundup_pow_of_two'
size = roundup_pow_of_two(size);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
--
^~~~~~~~~~~~~~~~~~~~~~~
lib/string_helpers.c:102:2: note: Taking false branch
if (units == STRING_UNITS_2) {
^
lib/string_helpers.c:112:12: note: Assigned value is garbage or undefined
remainder += rounding[j];
^ ~~~~~~~~~~~
lib/string_helpers.c:119:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), ".%03u", remainder);
^~~~~~~~
lib/string_helpers.c:119:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), ".%03u", remainder);
^~~~~~~~
lib/string_helpers.c:129:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "%u%s %s", (u32)size,
^~~~~~~~
lib/string_helpers.c:129:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "%u%s %s", (u32)size,
^~~~~~~~
lib/string_helpers.c:792:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dest + written + 1, 0, count - written - 1);
^~~~~~
lib/string_helpers.c:792:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dest + written + 1, 0, count - written - 1);
^~~~~~
lib/string_helpers.c:962:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, src, count);
^~~~~~
lib/string_helpers.c:962:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, src, count);
^~~~~~
lib/string_helpers.c:963:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dest + count, pad, dest_len - count);
^~~~~~
lib/string_helpers.c:963:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dest + count, pad, dest_len - count);
^~~~~~
lib/string_helpers.c:965:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, src, dest_len);
^~~~~~
lib/string_helpers.c:965:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, src, dest_len);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
crypto/sha3_generic.c:170:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sctx->st, 0, sizeof(sctx->st));
^~~~~~
crypto/sha3_generic.c:170:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sctx->st, 0, sizeof(sctx->st));
^~~~~~
crypto/sha3_generic.c:188:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sctx->buf + sctx->partial, data,
^~~~~~
crypto/sha3_generic.c:188:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sctx->buf + sctx->partial, data,
^~~~~~
crypto/sha3_generic.c:206:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sctx->buf + sctx->partial, src, len - done);
^~~~~~
crypto/sha3_generic.c:206:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sctx->buf + sctx->partial, src, len - done);
^~~~~~
crypto/sha3_generic.c:221:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sctx->buf + inlen, 0, sctx->rsiz - inlen);
^~~~~~
crypto/sha3_generic.c:221:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sctx->buf + inlen, 0, sctx->rsiz - inlen);
^~~~~~
crypto/sha3_generic.c:235:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sctx, 0, sizeof(*sctx));
^~~~~~
crypto/sha3_generic.c:235:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sctx, 0, sizeof(*sctx));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
kernel/power/hibernate.c:1071:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "[disabled]\n");
^~~~~~~
kernel/power/hibernate.c:1071:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "[disabled]\n");
^~~~~~~
>> kernel/power/hibernate.c:1091:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "[%s] ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1091:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "[%s] ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1093:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "%s ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1093:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "%s ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1095:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "\n");
^~~~~~~
kernel/power/hibernate.c:1095:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "\n");
^~~~~~~
kernel/power/hibernate.c:1153:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d:%d\n", MAJOR(swsusp_resume_device),
^~~~~~~
kernel/power/hibernate.c:1153:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d:%d\n", MAJOR(swsusp_resume_device),
^~~~~~~
kernel/power/hibernate.c:1190:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", (unsigned long long)swsusp_resume_block);
^~~~~~~
kernel/power/hibernate.c:1190:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", (unsigned long long)swsusp_resume_block);
^~~~~~~
kernel/power/hibernate.c:1213:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", image_size);
^~~~~~~
kernel/power/hibernate.c:1213:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", image_size);
^~~~~~~
kernel/power/hibernate.c:1221:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1221:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1234:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", reserved_size);
^~~~~~~
kernel/power/hibernate.c:1234:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", reserved_size);
^~~~~~~
kernel/power/hibernate.c:1243:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1243:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1281:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(resume_file, str, 255);
^~~~~~~
kernel/power/hibernate.c:1281:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(resume_file, str, 255);
^~~~~~~
kernel/power/hibernate.c:1292:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(str, "%llu", &offset) == 1)
^~~~~~
kernel/power/hibernate.c:1292:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(str, "%llu", &offset) == 1)
^~~~~~
Suppressed 39 warnings (38 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
kernel/bpf/arraymap.c:321:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(this_cpu_ptr(array->pptrs[index & array->index_mask]),
^~~~~~
kernel/bpf/arraymap.c:321:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(this_cpu_ptr(array->pptrs[index & array->index_mask]),
^~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
84 warnings generated.
kernel/bpf/lpm_trie.c:295:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(node->data + trie->data_size, value,
^~~~~~
kernel/bpf/lpm_trie.c:295:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(node->data + trie->data_size, value,
^~~~~~
kernel/bpf/lpm_trie.c:340:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_node->data, key->data, trie->data_size);
^~~~~~
kernel/bpf/lpm_trie.c:340:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_node->data, key->data, trie->data_size);
^~~~~~
kernel/bpf/lpm_trie.c:404:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(im_node->data, node->data, trie->data_size);
^~~~~~
kernel/bpf/lpm_trie.c:404:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(im_node->data, node->data, trie->data_size);
--
^
include/linux/page-flags.h:195:23: note: Loop condition is false. Exiting loop
unsigned long head = READ_ONCE(page->compound_head);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:2: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
include/linux/page-flags.h:195:23: note: Dereference of null pointer
unsigned long head = READ_ONCE(page->compound_head);
^
include/asm-generic/rwonce.h:50:2: note: expanded from macro 'READ_ONCE'
__READ_ONCE(x); \
^~~~~~~~~~~~~~
include/asm-generic/rwonce.h:44:24: note: expanded from macro '__READ_ONCE'
#define __READ_ONCE(x) (*(const volatile __unqual_scalar_typeof(x) *)&(x))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
drivers/gpu/drm/bridge/tc358767.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(auxwdata, data, size);
^~~~~~
drivers/gpu/drm/bridge/tc358767.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(auxwdata, data, size);
^~~~~~
drivers/gpu/drm/bridge/tc358767.c:326:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, auxrdata, size);
^~~~~~
drivers/gpu/drm/bridge/tc358767.c:326:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, auxrdata, size);
^~~~~~
drivers/gpu/drm/bridge/tc358767.c:820:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_write(tc->regmap, DP0_VIDSYNCDELAY,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/tc358767.c:820:2: note: Value stored to 'ret' is never read
ret = regmap_write(tc->regmap, DP0_VIDSYNCDELAY,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/tc358767.c:946:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_write(tc->regmap, DP_PHY_CTRL, dp_phy_ctrl);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/tc358767.c:946:2: note: Value stored to 'ret' is never read
ret = regmap_write(tc->regmap, DP_PHY_CTRL, dp_phy_ctrl);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/tc358767.c:949:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_write(tc->regmap, DP_PHY_CTRL, dp_phy_ctrl);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/tc358767.c:949:2: note: Value stored to 'ret' is never read
ret = regmap_write(tc->regmap, DP_PHY_CTRL, dp_phy_ctrl);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/misc/enclosure.c:186:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(name, "enclosure_device:");
^~~~~~
drivers/misc/enclosure.c:186:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(name, "enclosure_device:");
^~~~~~
drivers/misc/enclosure.c:187:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(name, dev_name(&cdev->cdev));
^~~~~~
drivers/misc/enclosure.c:187:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(name, dev_name(&cdev->cdev));
^~~~~~
drivers/misc/enclosure.c:310:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:310:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:313:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:313:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/misc/kgdbts.c:240:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:240:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:390:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:390:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:709:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:709:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:714:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:714:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:832:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:832:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:1075:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1075:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1146:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1146:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/clk/ingenic/cgu.c:512:10: warning: Division by zero [clang-analyzer-core.DivideZero]
rate = DIV_ROUND_UP(parent_rate, div);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:54: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
~~~~~~~~~~~~~~~~^~~~~
drivers/clk/ingenic/cgu.c:510:6: note: Assuming the condition is true
if (clk_info->type & CGU_CLK_DIV) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:510:2: note: Taking true branch
if (clk_info->type & CGU_CLK_DIV) {
^
drivers/clk/ingenic/cgu.c:511:9: note: Calling 'ingenic_clk_calc_div'
div = ingenic_clk_calc_div(hw, clk_info, parent_rate, req_rate);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:443:6: note: Assuming the condition is false
if (clk_info->div.bypass_mask & BIT(parent))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:443:2: note: Taking false branch
if (clk_info->div.bypass_mask & BIT(parent))
^
drivers/clk/ingenic/cgu.c:449:6: note: Assuming field 'div_table' is non-null
if (clk_info->div.div_table) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:449:2: note: Taking true branch
if (clk_info->div.div_table) {
^
drivers/clk/ingenic/cgu.c:450:12: note: Calling 'ingenic_clk_calc_hw_div'
hw_div = ingenic_clk_calc_hw_div(clk_info, div);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:417:18: note: 'best_i' initialized to 0
unsigned int i, best_i = 0, best = (unsigned int)-1;
^~~~~~
drivers/clk/ingenic/cgu.c:419:14: note: Assuming the condition is true
for (i = 0; i < (1 << clk_info->div.bits)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/ingenic/cgu.c:419:14: note: Left side of '&&' is true
drivers/clk/ingenic/cgu.c:419:2: note: Loop condition is false. Execution continues on line 431
for (i = 0; i < (1 << clk_info->div.bits)
^
drivers/clk/ingenic/cgu.c:431:2: note: Returning zero (loaded from 'best_i')
--
^ ~~~~~~~~~~~~~~
drivers/misc/xilinx_sdfec.c:418:16: warning: The left operand of '>=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (turbo.alg >= XSDFEC_TURBO_ALG_MAX)
^
drivers/misc/xilinx_sdfec.c:953:6: note: Assuming field 'state' is not equal to XSDFEC_NEEDS_RESET
if (xsdfec->state == XSDFEC_NEEDS_RESET &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/xilinx_sdfec.c:953:42: note: Left side of '&&' is false
if (xsdfec->state == XSDFEC_NEEDS_RESET &&
^
drivers/misc/xilinx_sdfec.c:959:2: note: Control jumps to 'case 2148034052:' at line 984
switch (cmd) {
^
drivers/misc/xilinx_sdfec.c:985:10: note: Calling 'xsdfec_set_turbo'
rval = xsdfec_set_turbo(xsdfec, arg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/xilinx_sdfec.c:414:8: note: Calling 'copy_from_user'
err = copy_from_user(&turbo, arg, sizeof(turbo));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Calling 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/fault-inject-usercopy.h:18:49: note: Returning zero, which participates in a condition later
static inline bool should_fail_usercopy(void) { return false; }
^~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Returning from 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/mips/include/asm/uaccess.h:455:2: note: Returning without writing to 'to->alg'
return __cu_len_r;
^
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:6: note: Assuming 'res' is 0, which participates in a condition later
if (unlikely(res))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning without writing to 'to->alg'
return res;
^
include/linux/uaccess.h:163:2: note: Returning zero (loaded from 'res'), which participates in a condition later
return res;
^~~~~~~~~~
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning without writing to 'to->alg'
return n;
^
include/linux/uaccess.h:193:2: note: Returning zero (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
drivers/misc/xilinx_sdfec.c:414:8: note: Returning from 'copy_from_user'
err = copy_from_user(&turbo, arg, sizeof(turbo));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/xilinx_sdfec.c:415:6: note: 'err' is 0
if (err)
^~~
drivers/misc/xilinx_sdfec.c:415:2: note: Taking false branch
if (err)
^
drivers/misc/xilinx_sdfec.c:418:16: note: The left operand of '>=' is a garbage value
if (turbo.alg >= XSDFEC_TURBO_ALG_MAX)
~~~~~~~~~ ^
drivers/misc/xilinx_sdfec.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
>> drivers/gpu/drm/drm_dp_aux_dev.c:115:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
res = sprintf(buf, "%s\n", aux_dev->aux->name);
^~~~~~~
drivers/gpu/drm/drm_dp_aux_dev.c:115:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
res = sprintf(buf, "%s\n", aux_dev->aux->name);
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/gpu/drm/selftests/test-drm_mm.c:212:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm, 0, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:212:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm, 0, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:218:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm, 0xff, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:218:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm, 0xff, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:236:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:236:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:277:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nodes, 0, sizeof(nodes));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:277:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(nodes, 0, sizeof(nodes));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:600:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(node, 0, sizeof(*node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:600:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(node, 0, sizeof(*node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1471:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1471:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1952:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rsvd_lo, 0, sizeof(rsvd_lo));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1952:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rsvd_lo, 0, sizeof(rsvd_lo));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1961:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rsvd_hi, 0, sizeof(rsvd_hi));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1961:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rsvd_hi, 0, sizeof(rsvd_hi));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&node, 0, sizeof(node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&node, 0, sizeof(node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2181:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
drm_mm_for_each_node_safe(node, nn, &mm) {
^
include/drm/drm_mm.h:376:2: note: expanded from macro 'drm_mm_for_each_node_safe'
list_for_each_entry_safe(entry, next, drm_mm_nodes(mm), node_list)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2034:29: note: Assuming '__UNIQUE_ID___x238' is >= '__UNIQUE_ID___y239'
const unsigned int count = min(4096u, max_iterations);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2034:29: note: '?' condition is false
const unsigned int count = min(4096u, max_iterations);
--
^
arch/mips/include/asm/cpu-features.h:336:24: note: expanded from macro 'cpu_has_mips_r'
cpu_has_mips64r5 | cpu_has_mips64r6)
^
arch/mips/include/asm/cpu-features.h:303:27: note: expanded from macro 'cpu_has_mips64r6'
# define cpu_has_mips64r6 __isa_ge_and_flag(6, MIPS_CPU_ISA_M64R6)
^
arch/mips/include/asm/cpu-features.h:60:63: note: expanded from macro '__isa_ge_and_flag'
#define __isa_ge_and_flag(isa, flag) ((MIPS_ISA_REV >= (isa)) && __isa(flag))
^
arch/mips/include/asm/bitops.h:390:44: note: Left side of '&&' is false
__builtin_constant_p(cpu_has_clo_clz) && cpu_has_clo_clz) {
^
arch/mips/include/asm/bitops.h:402:2: note: The value 32 is assigned to 'r'
r = 32;
^~~~~~
arch/mips/include/asm/bitops.h:403:6: note: Assuming 'x' is not equal to 0, which participates in a condition later
if (!x)
^~
arch/mips/include/asm/bitops.h:403:2: note: Taking false branch
if (!x)
^
arch/mips/include/asm/bitops.h:405:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
arch/mips/include/asm/bitops.h:405:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
arch/mips/include/asm/bitops.h:409:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
arch/mips/include/asm/bitops.h:409:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
arch/mips/include/asm/bitops.h:413:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
arch/mips/include/asm/bitops.h:413:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
arch/mips/include/asm/bitops.h:417:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
arch/mips/include/asm/bitops.h:417:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
arch/mips/include/asm/bitops.h:421:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
arch/mips/include/asm/bitops.h:421:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
arch/mips/include/asm/bitops.h:425:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
drivers/net/can/dev/rx-offload.c:335:36: note: Returning from 'fls'
offload->skb_queue_len_max = 2 << fls(weight);
^~~~~~~~~~~
drivers/net/can/dev/rx-offload.c:335:33: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
offload->skb_queue_len_max = 2 << fls(weight);
^ ~~~~~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/input/misc/yealink.c:288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:305:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p->data, &buf[ix], len);
^~~~~~
drivers/input/misc/yealink.c:305:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p->data, &buf[ix], len);
^~~~~~
drivers/input/misc/yealink.c:321:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:321:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:516:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:516:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:558:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &map_seg7, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:558:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &map_seg7, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:567:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&map_seg7, buf, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:567:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&map_seg7, buf, sizeof(map_seg7));
^~~~~~
>> drivers/input/misc/yealink.c:691:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(&buf[ret], "%s %s\n",
^~~~~~~
drivers/input/misc/yealink.c:691:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(&buf[ret], "%s %s\n",
^~~~~~~
drivers/input/misc/yealink.c:979:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = sysfs_create_group(&intf->dev.kobj, &yld_attr_group);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/misc/yealink.c:979:2: note: Value stored to 'ret' is never read
ret = sysfs_create_group(&intf->dev.kobj, &yld_attr_group);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/mfd/ti-lmu.c:159:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(®map_cfg, 0, sizeof(struct regmap_config));
^~~~~~
drivers/mfd/ti-lmu.c:159:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(®map_cfg, 0, sizeof(struct regmap_config));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/ata/libata-sff.c:611:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, pad, slop);
^~~~~~
drivers/ata/libata-sff.c:611:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, pad, slop);
^~~~~~
drivers/ata/libata-sff.c:613:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pad, buf, slop);
^~~~~~
drivers/ata/libata-sff.c:613:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pad, buf, slop);
^~~~~~
drivers/ata/libata-sff.c:1278:27: warning: Access to field 'active_tag' results in a dereference of a null pointer (loaded from variable 'link') [clang-analyzer-core.NullDereference]
qc = ata_qc_from_tag(ap, link->active_tag);
^~~~
drivers/ata/libata-sff.c:1269:2: note: 'link' initialized here
struct ata_link *link = ap->sff_pio_task_link;
^~~~~~~~~~~~~~~~~~~~~
drivers/ata/libata-sff.c:1276:9: note: Assuming field 'sff_pio_task_link' is equal to null
BUG_ON(ap->sff_pio_task_link == NULL);
^
arch/mips/include/asm/bug.h:34:44: note: expanded from macro 'BUG_ON'
#define BUG_ON(C) __BUG_ON((unsigned long)(C))
^
drivers/ata/libata-sff.c:1278:27: note: Access to field 'active_tag' results in a dereference of a null pointer (loaded from variable 'link')
qc = ata_qc_from_tag(ap, link->active_tag);
^~~~
drivers/ata/libata-sff.c:1814:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tf, 0, sizeof(tf));
^~~~~~
drivers/ata/libata-sff.c:1814:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tf, 0, sizeof(tf));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/base/regmap/regcache-rbtree.c:293:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(present + BITS_TO_LONGS(rbnode->blklen), 0,
^~~~~~
drivers/base/regmap/regcache-rbtree.c:293:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(present + BITS_TO_LONGS(rbnode->blklen), 0,
^~~~~~
drivers/base/regmap/regcache-rbtree.c:302:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(blk + offset * map->cache_word_size,
^~~~~~~
drivers/base/regmap/regcache-rbtree.c:302:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(blk + offset * map->cache_word_size,
^~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/base/regmap/regmap-debugfs.c:31:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(NULL, 0, "%x", max_val);
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:31:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(NULL, 0, "%x", max_val);
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:50:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(buf, PAGE_SIZE, "%s\n", name);
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:50:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(buf, PAGE_SIZE, "%s\n", name);
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:251:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + buf_pos, count - buf_pos, "%.*x: ",
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:251:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + buf_pos, count - buf_pos, "%.*x: ",
^~~~~~~~
drivers/base/regmap/regmap-debugfs.c:258:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + buf_pos, count - buf_pos,
--
fs/btrfs/ctree.h:1641:9: note: expanded from macro 'BTRFS_SETGET_STACK_FUNCS'
return get_unaligned_le##bits(&s->member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
note: expanded from here
include/asm-generic/unaligned.h:37:21: note: '__pptr' initialized to a null pointer value
return le64_to_cpu(__get_unaligned_t(__le64, p));
^
include/asm-generic/unaligned.h:13:37: note: expanded from macro '__get_unaligned_t'
const struct { type x; } __packed *__pptr = (typeof(__pptr))(ptr); \
^~~~~~
include/uapi/linux/byteorder/big_endian.h:33:59: note: expanded from macro '__le64_to_cpu'
#define __le64_to_cpu(x) __swab64((__force __u64)(__le64)(x))
^
include/uapi/linux/swab.h:128:54: note: expanded from macro '__swab64'
#define __swab64(x) (__u64)__builtin_bswap64((__u64)(x))
^
include/asm-generic/unaligned.h:37:21: note: Access to field 'x' results in a dereference of a null pointer (loaded from variable '__pptr')
return le64_to_cpu(__get_unaligned_t(__le64, p));
^
include/asm-generic/unaligned.h:14:2: note: expanded from macro '__get_unaligned_t'
__pptr->x; \
^~~~~~
include/uapi/linux/byteorder/big_endian.h:33:59: note: expanded from macro '__le64_to_cpu'
#define __le64_to_cpu(x) __swab64((__force __u64)(__le64)(x))
^
include/uapi/linux/swab.h:128:54: note: expanded from macro '__swab64'
#define __swab64(x) (__u64)__builtin_bswap64((__u64)(x))
^
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/usb/storage/onetouch.c:213:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(onetouch->name, sizeof(onetouch->name),
^~~~~~~~
drivers/usb/storage/onetouch.c:213:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(onetouch->name, sizeof(onetouch->name),
^~~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
drivers/usb/storage/sddr09.c:240:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, ecc, 3);
^~~~~~
drivers/usb/storage/sddr09.c:240:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, ecc, 3);
^~~~~~
drivers/usb/storage/sddr09.c:352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:528:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:528:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:717:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:717:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:796:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, len);
^~~~~~
drivers/usb/storage/sddr09.c:796:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, len);
^~~~~~
drivers/usb/storage/sddr09.c:922:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bptr, xptr, info->pagesize);
^~~~~~
drivers/usb/storage/sddr09.c:922:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bptr, xptr, info->pagesize);
^~~~~~
drivers/usb/storage/sddr09.c:1076:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:1076:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:1106:3: warning: Value stored to 'wp_fmt' is never read [clang-analyzer-deadcode.DeadStores]
wp_fmt = " WP";
^ ~~~~~
drivers/usb/storage/sddr09.c:1106:3: note: Value stored to 'wp_fmt' is never read
wp_fmt = " WP";
^ ~~~~~
drivers/usb/storage/sddr09.c:1108:3: warning: Value stored to 'wp_fmt' is never read [clang-analyzer-deadcode.DeadStores]
wp_fmt = "";
^ ~~
drivers/usb/storage/sddr09.c:1108:3: note: Value stored to 'wp_fmt' is never read
wp_fmt = "";
^ ~~
drivers/usb/storage/sddr09.c:1153:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt, "sddr09: Found Flash card, ID = %4ph", deviceID);
^~~~~~~
drivers/usb/storage/sddr09.c:1153:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt, "sddr09: Found Flash card, ID = %4ph", deviceID);
^~~~~~~
>> drivers/usb/storage/sddr09.c:1156:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1156:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1168:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1168:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1171:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1171:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1177:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1177:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1183:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1183:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1188:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1188:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1563:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, 18);
^~~~~~
drivers/usb/storage/sddr09.c:1563:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, 18);
^~~~~~
drivers/usb/storage/sddr09.c:1581:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, inquiry_response, 8);
^~~~~~
drivers/usb/storage/sddr09.c:1581:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, inquiry_response, 8);
^~~~~~
drivers/usb/storage/sddr09.c:1639:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, mode_page_01, sizeof(mode_page_01));
^~~~~~
drivers/usb/storage/sddr09.c:1639:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, mode_page_01, sizeof(mode_page_01));
^~~~~~
drivers/usb/storage/sddr09.c:1705:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ptr+strlen(ptr), "%02X ", srb->cmnd[i]);
^~~~~~~
drivers/usb/storage/sddr09.c:1705:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ptr+strlen(ptr), "%02X ", srb->cmnd[i]);
^~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/nvme/target/io-cmd-file.c:166:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req->f.iocb, 0, sizeof(struct kiocb));
^~~~~~
drivers/nvme/target/io-cmd-file.c:166:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req->f.iocb, 0, sizeof(struct kiocb));
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
include/linux/blkdev.h:522:16: warning: The result of the right shift is undefined because the right operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
return sector >> ilog2(q->limits.chunk_sectors);
^
drivers/nvme/target/zns.c:467:26: note: Calling 'bdev_zone_sectors'
sector_t zone_sectors = bdev_zone_sectors(bdev);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:1118:6: note: Assuming 'q' is non-null
if (q)
^
include/linux/blkdev.h:1118:2: note: Taking true branch
if (q)
^
include/linux/blkdev.h:1119:10: note: Calling 'blk_queue_zone_sectors'
return blk_queue_zone_sectors(q);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:508:9: note: Calling 'blk_queue_is_zoned'
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Calling 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:490:2: note: Taking true branch
if (IS_ENABLED(CONFIG_BLK_DEV_ZONED))
^
include/linux/blkdev.h:491:3: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return q->limits.zoned;
--
^~~~~~~~
drivers/i2c/busses/i2c-designware-master.c:891:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name),
^~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/i2c/busses/i2c-gpio.c:384:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pdata, dev_get_platdata(dev), sizeof(*pdata));
^~~~~~
drivers/i2c/busses/i2c-gpio.c:384:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pdata, dev_get_platdata(dev), sizeof(*pdata));
^~~~~~
drivers/i2c/busses/i2c-gpio.c:441:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(adap->name, sizeof(adap->name), "i2c-gpio%d", pdev->id);
^~~~~~~~
drivers/i2c/busses/i2c-gpio.c:441:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name), "i2c-gpio%d", pdev->id);
^~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/input/keyboard/adp5589-keys.c:474:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pin_used, false, sizeof(pin_used));
^~~~~~
drivers/input/keyboard/adp5589-keys.c:474:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pin_used, false, sizeof(pin_used));
^~~~~~
drivers/input/keyboard/adp5589-keys.c:897:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kpad->keycode, pdata->keymap,
^~~~~~
drivers/input/keyboard/adp5589-keys.c:897:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kpad->keycode, pdata->keymap,
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/input/keyboard/bcm-keypad.c:179:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val &= ~KPCR_ENABLE;
^ ~~~~~~~~~~~~
drivers/input/keyboard/bcm-keypad.c:179:2: note: Value stored to 'val' is never read
val &= ~KPCR_ENABLE;
^ ~~~~~~~~~~~~
Suppressed 30 warnings (29 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/usb/musb/musb_debugfs.c:171:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:171:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:271:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:271:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0x00, sizeof(buf));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
drivers/usb/typec/class.c:103:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->id_header);
^~~~~~~
drivers/usb/typec/class.c:103:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->id_header);
^~~~~~~
drivers/usb/typec/class.c:112:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->cert_stat);
^~~~~~~
drivers/usb/typec/class.c:112:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->cert_stat);
^~~~~~~
drivers/usb/typec/class.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->product);
^~~~~~~
drivers/usb/typec/class.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->product);
^~~~~~~
drivers/usb/typec/class.c:303:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dir, sizeof(dir), "mode%d", adev->mode);
^~~~~~~~
drivers/usb/typec/class.c:303:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dir, sizeof(dir), "mode%d", adev->mode);
^~~~~~~~
drivers/usb/typec/class.c:335:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", alt->vdo);
^~~~~~~
drivers/usb/typec/class.c:335:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", alt->vdo);
^~~~~~~
>> drivers/usb/typec/class.c:344:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/class.c:344:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/class.c:353:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->active ? "yes" : "no");
^~~~~~~
drivers/usb/typec/class.c:353:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->active ? "yes" : "no");
^~~~~~~
drivers/usb/typec/class.c:404:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "source\n");
^~~~~~~
drivers/usb/typec/class.c:404:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "source\n");
^~~~~~~
drivers/usb/typec/class.c:407:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "sink\n");
^~~~~~~
drivers/usb/typec/class.c:407:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "sink\n");
^~~~~~~
drivers/usb/typec/class.c:411:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "source sink\n");
^~~~~~~
drivers/usb/typec/class.c:411:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "source sink\n");
^~~~~~~
drivers/usb/typec/class.c:423:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", adev->mode);
^~~~~~~
drivers/usb/typec/class.c:423:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", adev->mode);
^~~~~~~
drivers/usb/typec/class.c:432:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%04x\n", adev->svid);
^~~~~~~
drivers/usb/typec/class.c:432:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%04x\n", adev->svid);
^~~~~~~
drivers/usb/typec/class.c:528:13: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
alt->roles = desc->roles;
^
drivers/usb/typec/class.c:1940:6: note: Assuming 'altmodes_node' is non-null
if (!altmodes_node)
^~~~~~~~~~~~~~
drivers/usb/typec/class.c:1940:2: note: Taking false branch
if (!altmodes_node)
^
drivers/usb/typec/class.c:1943:2: note: Loop condition is true. Entering loop body
fwnode_for_each_child_node(altmodes_node, child) {
^
include/linux/property.h:101:2: note: expanded from macro 'fwnode_for_each_child_node'
for (child = fwnode_get_next_child_node(fwnode, NULL); child; \
^
drivers/usb/typec/class.c:1945:7: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/usb/typec/class.c:1945:3: note: Taking false branch
if (ret) {
^
drivers/usb/typec/class.c:1952:7: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/usb/typec/class.c:1952:3: note: Taking false branch
if (ret) {
^
drivers/usb/typec/class.c:1958:7: note: Assuming 'index' is < 'n'
if (index >= n) {
^~~~~~~~~~
drivers/usb/typec/class.c:1958:3: note: Taking false branch
if (index >= n) {
^
drivers/usb/typec/class.c:1967:9: note: Calling 'typec_port_register_altmode'
alt = typec_port_register_altmode(port, &desc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/typec/class.c:1915:2: note: Taking false branch
if (IS_ERR(mux))
^
drivers/usb/typec/class.c:1918:9: note: Calling 'typec_register_altmode'
adev = typec_register_altmode(&port->dev, desc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/typec/class.c:519:8: note: Calling 'kzalloc'
alt = kzalloc(sizeof(*alt), GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Calling 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:569:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:586:2: note: Returning pointer, which participates in a condition later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Returning from 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:2: note: Returning pointer, which participates in a condition later
return kmalloc(size, flags | __GFP_ZERO);
--
^~~~~~
fs/ext4/inline.c:246:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)IFIRST(header) + le16_to_cpu(entry->e_value_offs) + pos,
^~~~~~
fs/ext4/inline.c:299:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)ext4_raw_inode(&is.iloc)->i_block,
^~~~~~
fs/ext4/inline.c:299:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)ext4_raw_inode(&is.iloc)->i_block,
^~~~~~
fs/ext4/inline.c:442:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)ext4_raw_inode(&is.iloc)->i_block,
^~~~~~
fs/ext4/inline.c:442:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)ext4_raw_inode(&is.iloc)->i_block,
^~~~~~
fs/ext4/inline.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei->i_data, 0, EXT4_MIN_INLINE_DATA_SIZE);
^~~~~~
fs/ext4/inline.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ei->i_data, 0, EXT4_MIN_INLINE_DATA_SIZE);
^~~~~~
fs/ext4/inline.c:1164:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)de, buf + EXT4_INLINE_DOTDOT_SIZE,
^~~~~~
fs/ext4/inline.c:1164:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)de, buf + EXT4_INLINE_DOTDOT_SIZE,
^~~~~~
fs/ext4/inline.c:1250:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data_bh->b_data, 0, inode->i_sb->s_blocksize);
^~~~~~
fs/ext4/inline.c:1250:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data_bh->b_data, 0, inode->i_sb->s_blocksize);
^~~~~~
fs/ext4/inline.c:1253:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data_bh->b_data, buf, inline_size);
^~~~~~
fs/ext4/inline.c:1253:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data_bh->b_data, buf, inline_size);
^~~~~~
fs/ext4/inline.c:1972:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p + i_size, 0,
^~~~~~
fs/ext4/inline.c:1972:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p + i_size, 0,
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/adm1021.c:152:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp[index]);
^~~~~~~
drivers/hwmon/adm1021.c:152:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp[index]);
^~~~~~~
drivers/hwmon/adm1021.c:161:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp_max[index]);
^~~~~~~
drivers/hwmon/adm1021.c:161:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp_max[index]);
^~~~~~~
drivers/hwmon/adm1021.c:170:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp_min[index]);
^~~~~~~
drivers/hwmon/adm1021.c:170:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp_min[index]);
^~~~~~~
drivers/hwmon/adm1021.c:178:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->alarms >> index) & 1);
^~~~~~~
drivers/hwmon/adm1021.c:178:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->alarms >> index) & 1);
^~~~~~~
drivers/hwmon/adm1021.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->alarms);
^~~~~~~
drivers/hwmon/adm1021.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->alarms);
^~~~~~~
drivers/hwmon/adm1021.c:245:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->low_power);
^~~~~~~
drivers/hwmon/adm1021.c:245:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->low_power);
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
>> drivers/usb/typec/bus.c:301:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/bus.c:301:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/usb/typec/altmodes/displayport.c:396:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = sprintf(buf, "%s ", cur ? "USB" : "[USB]");
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:396:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len = sprintf(buf, "%s ", cur ? "USB" : "[USB]");
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:400:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "[%s] ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:400:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "[%s] ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:403:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:403:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:496:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "[%s] ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:496:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "[%s] ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:499:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:499:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s ",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
drivers/media/usb/au0828/au0828-dvb.c:154:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(purb->transfer_buffer, 0, URB_BUFSIZE);
^~~~~~
drivers/media/usb/au0828/au0828-dvb.c:154:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(purb->transfer_buffer, 0, URB_BUFSIZE);
^~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
drivers/media/usb/hdpvr/hdpvr-control.c:107:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dev->usbc_buf, 0, 4);
^~~~~~
drivers/media/usb/hdpvr/hdpvr-control.c:107:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dev->usbc_buf, 0, 4);
^~~~~~
drivers/media/usb/hdpvr/hdpvr-control.c:127:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dev->usbc_buf, 0, 2);
^~~~~~
drivers/media/usb/hdpvr/hdpvr-control.c:127:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dev->usbc_buf, 0, 2);
^~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
233 warnings generated.
drivers/target/iscsi/iscsi_target_configfs.c:48:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rb = sprintf(page, "1\n");
^~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:48:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rb = sprintf(page, "1\n");
^~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:50:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rb = sprintf(page, "0\n");
^~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:50:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rb = sprintf(page, "0\n");
^~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:90:5: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = 0;
^ ~
drivers/target/iscsi/iscsi_target_configfs.c:90:5: note: Value stored to 'rc' is never read
rc = 0;
^ ~
drivers/target/iscsi/iscsi_target_configfs.c:171:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_PORTAL_LEN + 1, "%s", name);
^~~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:171:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_PORTAL_LEN + 1, "%s", name);
^~~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:311:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ISCSI_NACL_ATTR(dataout_timeout);
^
drivers/target/iscsi/iscsi_target_configfs.c:287:9: note: expanded from macro 'ISCSI_NACL_ATTR'
return sprintf(page, "%u\n", nacl->node_attrib.name); \
^~~~~~~
drivers/target/iscsi/iscsi_target_configfs.c:311:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ISCSI_NACL_ATTR(dataout_timeout);
^
drivers/target/iscsi/iscsi_target_configfs.c:287:9: note: expanded from macro 'ISCSI_NACL_ATTR'
return sprintf(page, "%u\n", nacl->node_attrib.name); \
--
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/extcon/extcon-fsa9480.c:207:3: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
u64 cables = cable_types[dev];
^
drivers/extcon/extcon-fsa9480.c:266:6: note: Assuming field 'irq' is not equal to 0
if (!client->irq) {
^~~~~~~~~~~~
drivers/extcon/extcon-fsa9480.c:266:2: note: Taking false branch
if (!client->irq) {
^
drivers/extcon/extcon-fsa9480.c:272:6: note: Assuming 'info' is non-null
if (!info)
^~~~~
drivers/extcon/extcon-fsa9480.c:272:2: note: Taking false branch
if (!info)
^
drivers/extcon/extcon-fsa9480.c:281:2: note: Taking false branch
if (IS_ERR(info->edev)) {
^
drivers/extcon/extcon-fsa9480.c:288:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/extcon/extcon-fsa9480.c:288:2: note: Taking false branch
if (ret) {
^
drivers/extcon/extcon-fsa9480.c:294:2: note: Taking false branch
if (IS_ERR(info->regmap)) {
^
drivers/extcon/extcon-fsa9480.c:316:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/extcon/extcon-fsa9480.c:316:2: note: Taking false branch
if (ret) {
^
drivers/extcon/extcon-fsa9480.c:322:2: note: Calling 'fsa9480_detect_dev'
fsa9480_detect_dev(info);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:6: note: Assuming 'val1' is >= 0
if (val1 < 0 || val2 < 0) {
^~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:6: note: Left side of '||' is false
drivers/extcon/extcon-fsa9480.c:227:18: note: Assuming 'val2' is >= 0
if (val1 < 0 || val2 < 0) {
^~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:2: note: Taking false branch
if (val1 < 0 || val2 < 0) {
^
drivers/extcon/extcon-fsa9480.c:233:2: note: Loop condition is false. Exiting loop
dev_info(usbsw->dev, "dev1: 0x%x, dev2: 0x%x\n", val1, val2);
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/extcon/extcon-fsa9480.c:236:2: note: Calling 'fsa9480_handle_change'
fsa9480_handle_change(usbsw, usbsw->cable & ~val, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/extcon/extcon-fsa9480.c:205:2: note: Loop condition is true. Entering loop body
while (mask) {
^
drivers/extcon/extcon-fsa9480.c:206:3: note: 'dev' initialized to 31
int dev = fls64(mask) - 1;
^~~~~~~
drivers/extcon/extcon-fsa9480.c:207:3: note: Assigned value is garbage or undefined
u64 cables = cable_types[dev];
^ ~~~~~~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
Suppressed 98 warnings (98 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
101 warnings generated.
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
102 warnings generated.
drivers/usb/host/xhci-dbgcap.c:377:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbc->eps, 0, sizeof(struct dbc_ep) * ARRAY_SIZE(dbc->eps));
^~~~~~
drivers/usb/host/xhci-dbgcap.c:377:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dbc->eps, 0, sizeof(struct dbc_ep) * ARRAY_SIZE(dbc->eps));
^~~~~~
drivers/usb/host/xhci-dbgcap.c:828:4: warning: Value stored to 'ctrl' is never read [clang-analyzer-deadcode.DeadStores]
ctrl = readl(&dbc->regs->control);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/host/xhci-dbgcap.c:828:4: note: Value stored to 'ctrl' is never read
ctrl = readl(&dbc->regs->control);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/usb/host/xhci-dbgcap.c:1004:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", p);
^~~~~~~
drivers/usb/host/xhci-dbgcap.c:1004:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", p);
^~~~~~~
Suppressed 99 warnings (99 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
Suppressed 99 warnings (99 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/base/platform.c:578:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(pa->name, name);
^~~~~~
drivers/base/platform.c:578:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(pa->name, name);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/base/cpu.c:364:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
drivers/base/cpu.c:364:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
include/linux/hid.h:1037:9: warning: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input') [clang-analyzer-core.NullDereference]
input->name, c, type);
^
drivers/hid/hid-apple.c:487:6: note: Assuming the condition is true
if (usage->hid == (HID_UP_CUSTOM | 0x0003) ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-apple.c:487:45: note: Left side of '||' is true
if (usage->hid == (HID_UP_CUSTOM | 0x0003) ||
^
drivers/hid/hid-apple.c:492:3: note: Calling 'hid_map_usage_clear'
hid_map_usage_clear(hi, usage, bit, max, EV_KEY, KEY_FN);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1065:2: note: Calling 'hid_map_usage'
hid_map_usage(hidinput, usage, bit, max, type, c);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1008:2: note: 'input' initialized here
struct input_dev *input = hidinput->input;
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1012:2: note: Control jumps to 'case 1:' at line 1021
switch (type) {
^
include/linux/hid.h:1024:3: note: Execution continues on line 1035
break;
^
include/linux/hid.h:1035:15: note: 'c' is <= 'limit'
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:15: note: Left side of '||' is false
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1035:28: note: Assuming 'bmap' is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:28: note: Assuming pointer value is null
if (unlikely(c > limit || !bmap)) {
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvmem/core.c:1693:6: note: Returning from 'IS_ERR'
if (IS_ERR(buf))
^~~~~~~~~~~
drivers/nvmem/core.c:1693:2: note: Taking false branch
if (IS_ERR(buf))
^
drivers/nvmem/core.c:1700:6: note: Assuming 'nbits' is 0
if (nbits)
^~~~~
drivers/nvmem/core.c:1700:2: note: Taking false branch
if (nbits)
^
drivers/nvmem/core.c:1703:11: note: The left operand of '>' is a garbage value
if (*len > max_len) {
~~~~ ^
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
drivers/hid/hid-quirks.c:1170:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
m = sscanf(quirks_param[n], "0x%hx:0x%hx:0x%x",
^~~~~~
drivers/hid/hid-quirks.c:1170:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
m = sscanf(quirks_param[n], "0x%hx:0x%hx:0x%x",
^~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/hid/hid-debug.c:495:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE, "%s",
^~~~~~~~
drivers/hid/hid-debug.c:495:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE, "%s",
^~~~~~~~
drivers/hid/hid-debug.c:505:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE, "%04x", page);
^~~~~~~~
drivers/hid/hid-debug.c:505:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE, "%04x", page);
^~~~~~~~
drivers/hid/hid-debug.c:535:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len,
^~~~~~~~
drivers/hid/hid-debug.c:535:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len,
^~~~~~~~
drivers/hid/hid-debug.c:547:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len, HID_DEBUG_BUFSIZE - len, "%04x",
^~~~~~~~
drivers/hid/hid-debug.c:547:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len, HID_DEBUG_BUFSIZE - len, "%04x",
^~~~~~~~
drivers/hid/hid-debug.c:717:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:717:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:723:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:723:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:741:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len, HID_DEBUG_BUFSIZE - len - 1, " = %d\n", value);
^~~~~~~~
drivers/hid/hid-debug.c:741:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len, HID_DEBUG_BUFSIZE - len - 1, " = %d\n", value);
^~~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
82 warnings generated.
drivers/infiniband/core/sysfs.c:590:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, out_mad->data + offset, size);
^~~~~~
drivers/infiniband/core/sysfs.c:590:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, out_mad->data + offset, size);
^~~~~~
drivers/infiniband/core/sysfs.c:1111:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(element->name, sizeof(element->name), "%d", i) >=
^~~~~~~~
drivers/infiniband/core/sysfs.c:1111:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(element->name, sizeof(element->name), "%d", i) >=
^~~~~~~~
drivers/infiniband/core/sysfs.c:1368:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(desc.node_desc, buf, min_t(int, count, IB_DEVICE_NODE_DESC_MAX));
^~~~~~
drivers/infiniband/core/sysfs.c:1368:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(desc.node_desc, buf, min_t(int, count, IB_DEVICE_NODE_DESC_MAX));
^~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
drivers/infiniband/core/device.c:425:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = rename_compat_devs(ibdev);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/infiniband/core/device.c:425:2: note: Value stored to 'ret' is never read
ret = rename_compat_devs(ibdev);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/infiniband/core/device.c:465:7: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(dev_name(&device->dev), name, &i) != 1)
^~~~~~
drivers/infiniband/core/device.c:465:7: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(dev_name(&device->dev), name, &i) != 1)
^~~~~~
drivers/infiniband/core/device.c:469:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof buf, name, i);
^~~~~~~~
drivers/infiniband/core/device.c:469:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof buf, name, i);
^~~~~~~~
drivers/infiniband/core/device.c:1249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&device->attrs, 0, sizeof(device->attrs));
^~~~~~
drivers/infiniband/core/device.c:1249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&device->attrs, 0, sizeof(device->attrs));
^~~~~~
drivers/infiniband/core/device.c:2019:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2019:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2057:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2057:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
Suppressed 93 warnings (93 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
Suppressed 68 warnings (68 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
net/netfilter/nft_immediate.c:211:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ctx->regs[priv->dreg].data, &priv->data, sizeof(priv->data));
^~~~~~
net/netfilter/nft_immediate.c:211:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ctx->regs[priv->dreg].data, &priv->data, sizeof(priv->data));
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
net/netfilter/nft_cmp.c:165:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key + reg->offset, data, reg->len);
^~~~~~
net/netfilter/nft_cmp.c:165:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key + reg->offset, data, reg->len);
^~~~~~
net/netfilter/nft_cmp.c:166:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mask + reg->offset, datamask, reg->len);
^~~~~~
net/netfilter/nft_cmp.c:166:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mask + reg->offset, datamask, reg->len);
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/hid/hid-microsoft.c:288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(*r));
^~~~~~
drivers/hid/hid-microsoft.c:288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(*r));
^~~~~~
include/linux/hid.h:1037:9: warning: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input') [clang-analyzer-core.NullDereference]
input->name, c, type);
^
drivers/hid/hid-microsoft.c:189:6: note: Assuming the condition is true
if (quirks & MS_ERGONOMY) {
^~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-microsoft.c:189:2: note: Taking true branch
if (quirks & MS_ERGONOMY) {
^
drivers/hid/hid-microsoft.c:190:13: note: Calling 'ms_ergonomy_kb_quirk'
int ret = ms_ergonomy_kb_quirk(hi, usage, bit, max);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-microsoft.c:85:6: note: Assuming the condition is true
if ((usage->hid & HID_USAGE_PAGE) == HID_UP_CONSUMER) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-microsoft.c:85:2: note: Taking true branch
if ((usage->hid & HID_USAGE_PAGE) == HID_UP_CONSUMER) {
^
drivers/hid/hid-microsoft.c:86:3: note: Control jumps to 'case 670:' at line 94
switch (usage->hid & HID_USAGE) {
^
drivers/hid/hid-microsoft.c:95:4: note: Calling 'hid_map_usage_clear'
ms_map_key_clear(KEY_PROG2);
^
drivers/hid/hid-microsoft.c:78:29: note: expanded from macro 'ms_map_key_clear'
#define ms_map_key_clear(c) hid_map_usage_clear(hi, usage, bit, max, \
--
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5720:30: note: Left side of '&&' is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^
net/netfilter/nf_tables_api.c:5723:6: note: Assuming 'flags' is equal to 0
if (flags != 0)
^~~~~~~~~~
net/netfilter/nf_tables_api.c:5723:2: note: Taking false branch
if (flags != 0)
^
net/netfilter/nf_tables_api.c:5726:6: note: Assuming the condition is false
if (set->flags & NFT_SET_MAP) {
^~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5726:2: note: Taking false branch
if (set->flags & NFT_SET_MAP) {
^
net/netfilter/nf_tables_api.c:5731:7: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_DATA] != NULL)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5731:3: note: Taking false branch
if (nla[NFTA_SET_ELEM_DATA] != NULL)
^
net/netfilter/nf_tables_api.c:5735:42: note: Left side of '&&' is false
if ((flags & NFT_SET_ELEM_INTERVAL_END) &&
^
net/netfilter/nf_tables_api.c:5746:6: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_TIMEOUT] != NULL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5746:2: note: Taking false branch
if (nla[NFTA_SET_ELEM_TIMEOUT] != NULL) {
^
net/netfilter/nf_tables_api.c:5753:13: note: Assuming the condition is false
} else if (set->flags & NFT_SET_TIMEOUT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5753:9: note: Taking false branch
} else if (set->flags & NFT_SET_TIMEOUT) {
^
net/netfilter/nf_tables_api.c:5758:6: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_EXPIRATION] != NULL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5758:2: note: Taking false branch
if (nla[NFTA_SET_ELEM_EXPIRATION] != NULL) {
^
net/netfilter/nf_tables_api.c:5767:6: note: Assuming the condition is true
if (nla[NFTA_SET_ELEM_EXPR]) {
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5767:2: note: Taking true branch
if (nla[NFTA_SET_ELEM_EXPR]) {
^
net/netfilter/nf_tables_api.c:5770:7: note: Assuming field 'num_exprs' is 0
if (set->num_exprs && set->num_exprs != 1)
^~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5770:22: note: Left side of '&&' is false
if (set->num_exprs && set->num_exprs != 1)
^
net/netfilter/nf_tables_api.c:5773:10: note: Calling 'nft_set_elem_expr_alloc'
expr = nft_set_elem_expr_alloc(ctx, set,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5332:9: note: Calling 'nft_expr_init'
expr = nft_expr_init(ctx, attr);
^~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2795:8: note: Calling 'nf_tables_expr_parse'
err = nf_tables_expr_parse(ctx, nla, &expr_info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2714:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:2714:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:2718:2: note: Taking true branch
if (IS_ERR(type))
^
net/netfilter/nf_tables_api.c:2719:3: note: Returning without writing to 'info->ops'
return PTR_ERR(type);
^
net/netfilter/nf_tables_api.c:2795:8: note: Returning from 'nf_tables_expr_parse'
err = nf_tables_expr_parse(ctx, nla, &expr_info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2796:6: note: 'err' is >= 0
if (err < 0)
^~~
net/netfilter/nf_tables_api.c:2796:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:2800:17: note: Access to field 'size' results in a dereference of an undefined pointer value (loaded from field 'ops')
expr = kzalloc(expr_info.ops->size, GFP_KERNEL);
^ ~~~
net/netfilter/nf_tables_api.c:2831:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, src->ops->size);
^~~~~~
net/netfilter/nf_tables_api.c:2831:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, src->ops->size);
^~~~~~
net/netfilter/nf_tables_api.c:3012:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cb->args[1], 0,
^~~~~~
net/netfilter/nf_tables_api.c:3012:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cb->args[1], 0,
^~~~~~
>> net/netfilter/nf_tables_api.c:3804:9: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!sscanf(i->name, name, &tmp))
^~~~~~
net/netfilter/nf_tables_api.c:3804:9: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!sscanf(i->name, name, &tmp))
^~~~~~
net/netfilter/nf_tables_api.c:3815:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(inuse, 0, PAGE_SIZE);
^~~~~~
net/netfilter/nf_tables_api.c:3815:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(inuse, 0, PAGE_SIZE);
^~~~~~
net/netfilter/nf_tables_api.c:4249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&desc, 0, sizeof(desc));
^~~~~~
net/netfilter/nf_tables_api.c:4249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&desc, 0, sizeof(desc));
^~~~~~
net/netfilter/nf_tables_api.c:5096:16: warning: The left operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (desc.type != NFT_DATA_VALUE || desc.len != set->klen) {
^
net/netfilter/nf_tables_api.c:6302:2: note: Taking false branch
if (IS_ERR(table)) {
^
net/netfilter/nf_tables_api.c:6308:2: note: Taking false branch
if (IS_ERR(set))
^
net/netfilter/nf_tables_api.c:6310:6: note: Assuming the condition is false
if (!list_empty(&set->bindings) && set->flags & NFT_SET_CONSTANT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6310:34: note: Left side of '&&' is false
if (!list_empty(&set->bindings) && set->flags & NFT_SET_CONSTANT)
^
net/netfilter/nf_tables_api.c:6315:6: note: Assuming the condition is false
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6315:2: note: Taking false branch
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
^
net/netfilter/nf_tables_api.c:6318:2: note: Loop condition is true. Entering loop body
nla_for_each_nested(attr, nla[NFTA_SET_ELEM_LIST_ELEMENTS], rem) {
^
include/net/netlink.h:1932:2: note: expanded from macro 'nla_for_each_nested'
nla_for_each_attr(pos, nla_data(nla), nla_len(nla), rem)
^
include/net/netlink.h:1921:2: note: expanded from macro 'nla_for_each_attr'
for (pos = head, rem = len; \
^
net/netfilter/nf_tables_api.c:6319:9: note: Calling 'nft_del_setelem'
err = nft_del_setelem(&ctx, set, attr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6132:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:6132:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:6136:6: note: 'err' is >= 0
if (err < 0)
^~~
net/netfilter/nf_tables_api.c:6136:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:6139:6: note: Assuming the condition is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6139:30: note: Left side of '&&' is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^
net/netfilter/nf_tables_api.c:6144:6: note: Assuming 'flags' is equal to 0
if (flags != 0)
^~~~~~~~~~
net/netfilter/nf_tables_api.c:6144:2: note: Taking false branch
if (flags != 0)
^
net/netfilter/nf_tables_api.c:6147:2: note: Taking true branch
if (nla[NFTA_SET_ELEM_KEY]) {
^
net/netfilter/nf_tables_api.c:6148:9: note: Calling 'nft_setelem_parse_key'
err = nft_setelem_parse_key(ctx, set, &elem.key.val,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5092:8: note: Calling 'nft_data_init'
err = nft_data_init(ctx, key, NFT_DATA_VALUE_MAXLEN, &desc, attr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9555:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:9555:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:9558:6: note: Assuming the condition is false
if (tb[NFTA_DATA_VALUE])
^~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9558:2: note: Taking false branch
if (tb[NFTA_DATA_VALUE])
^
net/netfilter/nf_tables_api.c:9561:6: note: Assuming the condition is true
if (tb[NFTA_DATA_VERDICT] && ctx != NULL)
^~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9561:6: note: Left side of '&&' is true
net/netfilter/nf_tables_api.c:9561:31: note: 'ctx' is not equal to NULL
vim +185 arch/mips/ath79/setup.c
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 42
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 43 static void __init ath79_detect_sys_type(void)
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 44 {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 45 char *chip = "????";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 46 u32 id;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 47 u32 major;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 48 u32 minor;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 49 u32 rev = 0;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 50 u32 ver = 1;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 51
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 52 id = ath79_reset_rr(AR71XX_RESET_REG_REV_ID);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 53 major = id & REV_ID_MAJOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 54
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 55 switch (major) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 56 case REV_ID_MAJOR_AR71XX:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 57 minor = id & AR71XX_REV_ID_MINOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 58 rev = id >> AR71XX_REV_ID_REVISION_SHIFT;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 59 rev &= AR71XX_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 60 switch (minor) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 61 case AR71XX_REV_ID_MINOR_AR7130:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 62 ath79_soc = ATH79_SOC_AR7130;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 63 chip = "7130";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 64 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 65
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 66 case AR71XX_REV_ID_MINOR_AR7141:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 67 ath79_soc = ATH79_SOC_AR7141;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 68 chip = "7141";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 69 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 70
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 71 case AR71XX_REV_ID_MINOR_AR7161:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 72 ath79_soc = ATH79_SOC_AR7161;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 73 chip = "7161";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 74 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 75 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 76 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 77
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 78 case REV_ID_MAJOR_AR7240:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 79 ath79_soc = ATH79_SOC_AR7240;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 80 chip = "7240";
8bed1288d479fd Gabor Juhos 2011-06-20 81 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 82 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 83
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 84 case REV_ID_MAJOR_AR7241:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 85 ath79_soc = ATH79_SOC_AR7241;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 86 chip = "7241";
8bed1288d479fd Gabor Juhos 2011-06-20 87 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 88 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 89
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 90 case REV_ID_MAJOR_AR7242:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 91 ath79_soc = ATH79_SOC_AR7242;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 92 chip = "7242";
8bed1288d479fd Gabor Juhos 2011-06-20 93 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 94 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 95
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 96 case REV_ID_MAJOR_AR913X:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 97 minor = id & AR913X_REV_ID_MINOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 98 rev = id >> AR913X_REV_ID_REVISION_SHIFT;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 99 rev &= AR913X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 100 switch (minor) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 101 case AR913X_REV_ID_MINOR_AR9130:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 102 ath79_soc = ATH79_SOC_AR9130;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 103 chip = "9130";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 104 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 105
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 106 case AR913X_REV_ID_MINOR_AR9132:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 107 ath79_soc = ATH79_SOC_AR9132;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 108 chip = "9132";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 109 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 110 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 111 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 112
80a7ed81a840ae Gabor Juhos 2012-03-14 113 case REV_ID_MAJOR_AR9330:
80a7ed81a840ae Gabor Juhos 2012-03-14 114 ath79_soc = ATH79_SOC_AR9330;
80a7ed81a840ae Gabor Juhos 2012-03-14 115 chip = "9330";
80a7ed81a840ae Gabor Juhos 2012-03-14 116 rev = id & AR933X_REV_ID_REVISION_MASK;
80a7ed81a840ae Gabor Juhos 2012-03-14 117 break;
80a7ed81a840ae Gabor Juhos 2012-03-14 118
80a7ed81a840ae Gabor Juhos 2012-03-14 119 case REV_ID_MAJOR_AR9331:
80a7ed81a840ae Gabor Juhos 2012-03-14 120 ath79_soc = ATH79_SOC_AR9331;
80a7ed81a840ae Gabor Juhos 2012-03-14 121 chip = "9331";
80a7ed81a840ae Gabor Juhos 2012-03-14 122 rev = id & AR933X_REV_ID_REVISION_MASK;
80a7ed81a840ae Gabor Juhos 2012-03-14 123 break;
80a7ed81a840ae Gabor Juhos 2012-03-14 124
d84114660a65e8 Gabor Juhos 2012-03-14 125 case REV_ID_MAJOR_AR9341:
d84114660a65e8 Gabor Juhos 2012-03-14 126 ath79_soc = ATH79_SOC_AR9341;
d84114660a65e8 Gabor Juhos 2012-03-14 127 chip = "9341";
d84114660a65e8 Gabor Juhos 2012-03-14 128 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 129 break;
d84114660a65e8 Gabor Juhos 2012-03-14 130
d84114660a65e8 Gabor Juhos 2012-03-14 131 case REV_ID_MAJOR_AR9342:
d84114660a65e8 Gabor Juhos 2012-03-14 132 ath79_soc = ATH79_SOC_AR9342;
d84114660a65e8 Gabor Juhos 2012-03-14 133 chip = "9342";
d84114660a65e8 Gabor Juhos 2012-03-14 134 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 135 break;
d84114660a65e8 Gabor Juhos 2012-03-14 136
d84114660a65e8 Gabor Juhos 2012-03-14 137 case REV_ID_MAJOR_AR9344:
d84114660a65e8 Gabor Juhos 2012-03-14 138 ath79_soc = ATH79_SOC_AR9344;
d84114660a65e8 Gabor Juhos 2012-03-14 139 chip = "9344";
d84114660a65e8 Gabor Juhos 2012-03-14 140 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 141 break;
d84114660a65e8 Gabor Juhos 2012-03-14 142
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 143 case REV_ID_MAJOR_QCA9533_V2:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 144 ver = 2;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 145 ath79_soc_rev = 2;
c9b0299034665d Liangliang Huang 2020-05-04 146 fallthrough;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 147 case REV_ID_MAJOR_QCA9533:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 148 ath79_soc = ATH79_SOC_QCA9533;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 149 chip = "9533";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 150 rev = id & QCA953X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 151 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 152
2e6c91e392fd7b Gabor Juhos 2013-02-15 153 case REV_ID_MAJOR_QCA9556:
2e6c91e392fd7b Gabor Juhos 2013-02-15 154 ath79_soc = ATH79_SOC_QCA9556;
2e6c91e392fd7b Gabor Juhos 2013-02-15 155 chip = "9556";
2e6c91e392fd7b Gabor Juhos 2013-02-15 156 rev = id & QCA955X_REV_ID_REVISION_MASK;
2e6c91e392fd7b Gabor Juhos 2013-02-15 157 break;
2e6c91e392fd7b Gabor Juhos 2013-02-15 158
2e6c91e392fd7b Gabor Juhos 2013-02-15 159 case REV_ID_MAJOR_QCA9558:
2e6c91e392fd7b Gabor Juhos 2013-02-15 160 ath79_soc = ATH79_SOC_QCA9558;
2e6c91e392fd7b Gabor Juhos 2013-02-15 161 chip = "9558";
2e6c91e392fd7b Gabor Juhos 2013-02-15 162 rev = id & QCA955X_REV_ID_REVISION_MASK;
2e6c91e392fd7b Gabor Juhos 2013-02-15 163 break;
2e6c91e392fd7b Gabor Juhos 2013-02-15 164
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 165 case REV_ID_MAJOR_QCA956X:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 166 ath79_soc = ATH79_SOC_QCA956X;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 167 chip = "956X";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 168 rev = id & QCA956X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 169 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 170
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 171 case REV_ID_MAJOR_TP9343:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 172 ath79_soc = ATH79_SOC_TP9343;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 173 chip = "9343";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 174 rev = id & QCA956X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 175 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 176
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 177 default:
ab75dc02c151c9 Ralf Baechle 2011-11-17 178 panic("ath79: unknown SoC, id:0x%08x", id);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 179 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 180
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 181 if (ver == 1)
be5f3623204e15 Gabor Juhos 2011-11-18 182 ath79_soc_rev = rev;
be5f3623204e15 Gabor Juhos 2011-11-18 183
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 184 if (soc_is_qca953x() || soc_is_qca955x() || soc_is_qca956x())
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 @185 sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 186 chip, ver, rev);
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 187 else if (soc_is_tp9343())
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 188 sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
2e6c91e392fd7b Gabor Juhos 2013-02-15 189 chip, rev);
2e6c91e392fd7b Gabor Juhos 2013-02-15 190 else
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 191 sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 192 pr_info("SoC: %s\n", ath79_sys_type);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 193 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 194
---
0-DAY CI Kernel Test Service
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-12 19:44 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-12 19:44 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 228831 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc7]
[cannot apply to masahiroy-kbuild/for-next srcres258-doc/doc-zh-tw next-20220310]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 11 days ago
:::::: commit date: 11 days ago
config: mips-randconfig-c004-20220302 (https://download.01.org/0day-ci/archive/20220313/202203130344.WpXY5TTo-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~
fs/xfs/xfs_fsmap.c:949:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dkeys[0], 0, sizeof(struct xfs_fsmap));
^~~~~~
fs/xfs/xfs_fsmap.c:949:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dkeys[0], 0, sizeof(struct xfs_fsmap));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
fs/isofs/util.c:40:14: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
tz |= (-1 << 8);
~~ ^
fs/isofs/util.c:30:6: note: Assuming 'flag' is equal to 0
if (flag == 0) tz = p[6]; /* High sierra has no time zone */
^~~~~~~~~
fs/isofs/util.c:30:2: note: Taking true branch
if (flag == 0) tz = p[6]; /* High sierra has no time zone */
^
fs/isofs/util.c:33:6: note: 'year' is >= 0
if (year < 0) {
^~~~
fs/isofs/util.c:33:2: note: Taking false branch
if (year < 0) {
^
fs/isofs/util.c:39:7: note: Assuming the condition is true
if (tz & 0x80)
^~~~~~~~~
fs/isofs/util.c:39:3: note: Taking true branch
if (tz & 0x80)
^
fs/isofs/util.c:40:14: note: The result of the left shift is undefined because the left operand is negative
tz |= (-1 << 8);
~~ ^
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
crypto/hmac.c:65:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ipad, inkey, keylen);
^~~~~~
crypto/hmac.c:65:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ipad, inkey, keylen);
^~~~~~
crypto/hmac.c:67:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ipad + keylen, 0, bs - keylen);
^~~~~~
crypto/hmac.c:67:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ipad + keylen, 0, bs - keylen);
^~~~~~
crypto/hmac.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(opad, ipad, bs);
^~~~~~
crypto/hmac.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(opad, ipad, bs);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
crypto/vmac.c:487:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dctx->polytmp, tctx->polykey, sizeof(dctx->polytmp));
^~~~~~
crypto/vmac.c:487:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dctx->polytmp, tctx->polykey, sizeof(dctx->polytmp));
^~~~~~
crypto/vmac.c:501:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n);
^~~~~~
crypto/vmac.c:501:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n);
^~~~~~
crypto/vmac.c:509:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dctx->partial[dctx->partial_size], p, n);
^~~~~~
crypto/vmac.c:509:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dctx->partial[dctx->partial_size], p, n);
^~~~~~
crypto/vmac.c:528:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dctx->partial, p, len);
^~~~~~
crypto/vmac.c:528:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dctx->partial, p, len);
^~~~~~
crypto/vmac.c:548:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dctx->partial[partial], 0, n - partial);
^~~~~~
crypto/vmac.c:548:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dctx->partial[partial], 0, n - partial);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (11 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> arch/mips/ath79/setup.c:185:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
^~~~~~~
arch/mips/ath79/setup.c:185:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
^~~~~~~
arch/mips/ath79/setup.c:188:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
^~~~~~~
arch/mips/ath79/setup.c:188:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
^~~~~~~
arch/mips/ath79/setup.c:191:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
^~~~~~~
arch/mips/ath79/setup.c:191:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
lib/test_min_heap.c:16:21: warning: The left operand of '<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
return *(int *)lhs < *(int *)rhs;
^
lib/test_min_heap.c:173:9: note: Calling 'test_heapify_all'
err += test_heapify_all(true);
^~~~~~~~~~~~~~~~~~~~~~
lib/test_min_heap.c:73:11: note: 'min_heap' is true
.less = min_heap ? less_than : greater_than,
^~~~~~~~
lib/test_min_heap.c:73:11: note: '?' condition is true
lib/test_min_heap.c:79:2: note: Calling 'min_heapify_all'
min_heapify_all(&heap, &funcs);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/min_heap.h:73:2: note: Loop condition is true. Entering loop body
for (i = heap->nr / 2; i >= 0; i--)
^
include/linux/min_heap.h:73:2: note: Loop condition is true. Entering loop body
include/linux/min_heap.h:74:3: note: Calling 'min_heapify'
min_heapify(heap, i, func);
^~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/min_heap.h:41:2: note: Loop condition is true. Entering loop body
for (;;) {
^
include/linux/min_heap.h:42:3: note: Taking false branch
if (pos * 2 + 1 >= heap->nr)
^
include/linux/min_heap.h:48:7: note: Calling 'less_than'
if (func->less(left, smallest))
^~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_min_heap.c:16:21: note: The left operand of '<' is a garbage value
return *(int *)lhs < *(int *)rhs;
~~~~~~~~~~~ ^
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
lib/test_printf.c:49:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
lib/test_printf.c:49:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
lib/test_printf.c:51:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
lib/test_printf.c:51:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
lib/test_printf.c:267:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:267:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:639:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:639:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:681:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:681:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:684:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "__GFP_ATOMIC|%#lx",
^~~~~~~~
--
^
fs/ext4/ioctl.c:1158:2: note: Control jumps to 'case 2148034064:' @line 1356
switch (cmd) {
^
fs/ext4/ioctl.c:1357:3: note: 'n_blocks_count' declared without an initial value
ext4_fsblk_t n_blocks_count;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ioctl.c:1361:7: note: Calling 'copy_from_user'
if (copy_from_user(&n_blocks_count, (__u64 __user *)arg,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Calling 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/fault-inject-usercopy.h:18:49: note: Returning zero, which participates in a condition later
static inline bool should_fail_usercopy(void) { return false; }
^~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Returning from 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/mips/include/asm/uaccess.h:455:2: note: Returning without writing to '*to'
return __cu_len_r;
^
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:6: note: Assuming 'res' is 0, which participates in a condition later
if (unlikely(res))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning without writing to '*to'
return res;
^
include/linux/uaccess.h:163:2: note: Returning zero (loaded from 'res'), which participates in a condition later
return res;
^~~~~~~~~~
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning without writing to '*to'
return n;
^
include/linux/uaccess.h:193:2: note: Returning zero (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
fs/ext4/ioctl.c:1361:7: note: Returning from 'copy_from_user'
if (copy_from_user(&n_blocks_count, (__u64 __user *)arg,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ioctl.c:1361:3: note: Taking false branch
if (copy_from_user(&n_blocks_count, (__u64 __user *)arg,
^
fs/ext4/ioctl.c:1367:7: note: Assuming 'err' is 0
if (err)
^~~
fs/ext4/ioctl.c:1367:3: note: Taking false branch
if (err)
^
fs/ext4/ioctl.c:1371:7: note: Assuming 'err' is 0
if (err)
^~~
fs/ext4/ioctl.c:1371:3: note: Taking false branch
if (err)
^
fs/ext4/ioctl.c:1374:9: note: 2nd function call argument is an uninitialized value
err = ext4_resize_fs(sb, n_blocks_count);
^ ~~~~~~~~~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
kernel/power/hibernate.c:1071:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "[disabled]\n");
^~~~~~~
kernel/power/hibernate.c:1071:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "[disabled]\n");
^~~~~~~
>> kernel/power/hibernate.c:1091:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "[%s] ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1091:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "[%s] ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1093:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "%s ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1093:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "%s ", hibernation_modes[i]);
^~~~~~~
kernel/power/hibernate.c:1095:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf, "\n");
^~~~~~~
kernel/power/hibernate.c:1095:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf, "\n");
^~~~~~~
kernel/power/hibernate.c:1153:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d:%d\n", MAJOR(swsusp_resume_device),
^~~~~~~
kernel/power/hibernate.c:1153:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d:%d\n", MAJOR(swsusp_resume_device),
^~~~~~~
kernel/power/hibernate.c:1190:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", (unsigned long long)swsusp_resume_block);
^~~~~~~
kernel/power/hibernate.c:1190:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", (unsigned long long)swsusp_resume_block);
^~~~~~~
kernel/power/hibernate.c:1213:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", image_size);
^~~~~~~
kernel/power/hibernate.c:1213:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", image_size);
^~~~~~~
kernel/power/hibernate.c:1221:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1221:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1234:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", reserved_size);
^~~~~~~
kernel/power/hibernate.c:1234:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", reserved_size);
^~~~~~~
kernel/power/hibernate.c:1243:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1243:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%lu", &size) == 1) {
^~~~~~
kernel/power/hibernate.c:1281:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(resume_file, str, 255);
^~~~~~~
kernel/power/hibernate.c:1281:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(resume_file, str, 255);
^~~~~~~
kernel/power/hibernate.c:1292:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(str, "%llu", &offset) == 1)
^~~~~~
kernel/power/hibernate.c:1292:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(str, "%llu", &offset) == 1)
^~~~~~
Suppressed 39 warnings (38 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
fs/overlayfs/super.c:1811:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EINVAL;
^ ~~~~~~~
fs/overlayfs/super.c:1811:2: note: Value stored to 'err' is never read
err = -EINVAL;
^ ~~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/video/hdmi.c:59:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(frame, 0, sizeof(*frame));
^~~~~~
drivers/video/hdmi.c:59:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(frame, 0, sizeof(*frame));
^~~~~~
drivers/video/hdmi.c:125:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, size);
^~~~~~
drivers/video/hdmi.c:125:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, size);
^~~~~~
drivers/video/hdmi.c:226:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(frame, 0, sizeof(*frame));
^~~~~~
drivers/video/hdmi.c:226:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(frame, 0, sizeof(*frame));
^~~~~~
drivers/video/hdmi.c:233:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(frame->vendor, vendor, min(len, sizeof(frame->vendor)));
--
^~~~~~~~~~~
drivers/mfd/as3711.c:145:2: note: Taking false branch
if (client->irq)
^
drivers/mfd/as3711.c:149:6: note: Calling 'IS_ERR'
if (IS_ERR(as3711->regmap)) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/as3711.c:149:6: note: Returning from 'IS_ERR'
if (IS_ERR(as3711->regmap)) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/as3711.c:149:2: note: Taking false branch
if (IS_ERR(as3711->regmap)) {
^
drivers/mfd/as3711.c:157:6: note: Assuming 'ret' is not equal to 0
if (!ret)
^~~~
drivers/mfd/as3711.c:157:2: note: Taking false branch
if (!ret)
^
drivers/mfd/as3711.c:159:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/mfd/as3711.c:159:2: note: Taking false branch
if (ret < 0) {
^
drivers/mfd/as3711.c:163:6: note: Assuming 'id1' is equal to 139
if (id1 != 0x8b)
^~~~~~~~~~~
drivers/mfd/as3711.c:163:2: note: Taking false branch
if (id1 != 0x8b)
^
drivers/mfd/as3711.c:165:2: note: Loop condition is false. Exiting loop
dev_info(as3711->dev, "AS3711 detected: %x:%x\n", id1, id2);
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/mfd/as3711.c:165:2: note: 4th function call argument is an uninitialized value
dev_info(as3711->dev, "AS3711 detected: %x:%x\n", id1, id2);
^
include/linux/dev_printk.h:150:24: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^ ~~~~~~~~~~~
include/linux/dev_printk.h:110:3: note: expanded from macro 'dev_printk_index_wrap'
_p_func(dev, fmt, ##__VA_ARGS__); \
^ ~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/misc/enclosure.c:186:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(name, "enclosure_device:");
^~~~~~
drivers/misc/enclosure.c:186:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(name, "enclosure_device:");
^~~~~~
drivers/misc/enclosure.c:187:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(name, dev_name(&cdev->cdev));
^~~~~~
drivers/misc/enclosure.c:187:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(name, dev_name(&cdev->cdev));
^~~~~~
drivers/misc/enclosure.c:310:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:310:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:313:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
drivers/misc/enclosure.c:313:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(newname, COMPONENT_NAME_SIZE,
^~~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/misc/kgdbts.c:240:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:240:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:390:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:390:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:709:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:709:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:714:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:714:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:832:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:832:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:1075:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1075:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1146:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1146:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/char/ipmi/ipmi_kcs_sm.c:285:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kcs->write_data, data, size);
^~~~~~
drivers/char/ipmi/ipmi_kcs_sm.c:285:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kcs->write_data, data, size);
^~~~~~
drivers/char/ipmi/ipmi_kcs_sm.c:304:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, kcs->read_data, kcs->read_pos);
^~~~~~
drivers/char/ipmi/ipmi_kcs_sm.c:304:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, kcs->read_data, kcs->read_pos);
^~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/char/ipmi/ipmi_smic_sm.c:144:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(smic->write_data, data, size);
^~~~~~
drivers/char/ipmi/ipmi_smic_sm.c:144:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(smic->write_data, data, size);
^~~~~~
drivers/char/ipmi/ipmi_smic_sm.c:169:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, smic->read_data, smic->read_pos);
^~~~~~
drivers/char/ipmi/ipmi_smic_sm.c:169:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, smic->read_data, smic->read_pos);
^~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/char/ipmi/ipmi_bt_sm.c:155:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "B_BUSY ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:155:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "B_BUSY ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:157:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "H_BUSY ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:157:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "H_BUSY ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:159:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "OEM0 ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:159:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "OEM0 ");
^~~~~~
drivers/char/ipmi/ipmi_bt_sm.c:161:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "SMS ");
--
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:30: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
mm/memory.c:2578:7: note: Taking false branch
if (WARN_ON_ONCE(pmd_leaf(*pmd)))
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:3: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
mm/memory.c:2578:3: note: Taking false branch
if (WARN_ON_ONCE(pmd_leaf(*pmd)))
^
mm/memory.c:2580:7: note: Assuming the condition is false
if (!pmd_none(*pmd) && WARN_ON_ONCE(pmd_bad(*pmd))) {
^~~~~~~~~~~~~~~
mm/memory.c:2580:23: note: Left side of '&&' is false
if (!pmd_none(*pmd) && WARN_ON_ONCE(pmd_bad(*pmd))) {
^
mm/memory.c:2585:9: note: Calling 'apply_to_pte_range'
err = apply_to_pte_range(mm, pmd, addr, next,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/memory.c:2520:2: note: 'ptl' declared without an initial value
spinlock_t *ptl;
^~~~~~~~~~~~~~~
mm/memory.c:2522:6: note: 'create' is false
if (create) {
^~~~~~
mm/memory.c:2522:2: note: Taking false branch
if (create) {
^
mm/memory.c:2529:23: note: Assuming the condition is true
mapped_pte = pte = (mm == &init_mm) ?
^~~~~~~~~~~~~~
mm/memory.c:2529:22: note: '?' condition is true
mapped_pte = pte = (mm == &init_mm) ?
^
mm/memory.c:2536:2: note: Loop condition is false. Exiting loop
arch_enter_lazy_mmu_mode();
^
include/linux/pgtable.h:986:36: note: expanded from macro 'arch_enter_lazy_mmu_mode'
#define arch_enter_lazy_mmu_mode() do {} while (0)
^
mm/memory.c:2538:6: note: Assuming 'fn' is null
if (fn) {
^~
mm/memory.c:2538:2: note: Taking false branch
if (fn) {
^
mm/memory.c:2549:2: note: Loop condition is false. Exiting loop
arch_leave_lazy_mmu_mode();
^
include/linux/pgtable.h:987:36: note: expanded from macro 'arch_leave_lazy_mmu_mode'
#define arch_leave_lazy_mmu_mode() do {} while (0)
^
mm/memory.c:2551:6: note: Assuming the condition is true
if (mm != &init_mm)
^~~~~~~~~~~~~~
mm/memory.c:2551:2: note: Taking true branch
if (mm != &init_mm)
^
mm/memory.c:2552:3: note: 1st function call argument is an uninitialized value
pte_unmap_unlock(mapped_pte, ptl);
^
include/linux/mm.h:2351:2: note: expanded from macro 'pte_unmap_unlock'
spin_unlock(ptl); \
^ ~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/misc/lkdtm/usercopy.c:145:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(one, 'A', size);
^~~~~~
drivers/misc/lkdtm/usercopy.c:145:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(one, 'A', size);
^~~~~~
drivers/misc/lkdtm/usercopy.c:146:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(two, 'B', size);
^~~~~~
drivers/misc/lkdtm/usercopy.c:146:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(two, 'B', size);
^~~~~~
drivers/misc/lkdtm/usercopy.c:222:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 'B', cache_size);
^~~~~~
drivers/misc/lkdtm/usercopy.c:222:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 'B', cache_size);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
>> drivers/gpu/drm/drm_dp_aux_dev.c:115:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
res = sprintf(buf, "%s\n", aux_dev->aux->name);
^~~~~~~
drivers/gpu/drm/drm_dp_aux_dev.c:115:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
res = sprintf(buf, "%s\n", aux_dev->aux->name);
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/gpu/drm/selftests/test-drm_mm.c:212:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm, 0, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:212:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm, 0, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:218:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm, 0xff, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:218:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm, 0xff, sizeof(mm));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:236:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:236:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:277:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nodes, 0, sizeof(nodes));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:277:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(nodes, 0, sizeof(nodes));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:600:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(node, 0, sizeof(*node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:600:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(node, 0, sizeof(*node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1471:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1471:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tmp, 0, sizeof(tmp));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1952:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rsvd_lo, 0, sizeof(rsvd_lo));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1952:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rsvd_lo, 0, sizeof(rsvd_lo));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1961:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rsvd_hi, 0, sizeof(rsvd_hi));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1961:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rsvd_hi, 0, sizeof(rsvd_hi));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&node, 0, sizeof(node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:1976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&node, 0, sizeof(node));
^~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2181:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
drm_mm_for_each_node_safe(node, nn, &mm) {
^
include/drm/drm_mm.h:376:2: note: expanded from macro 'drm_mm_for_each_node_safe'
list_for_each_entry_safe(entry, next, drm_mm_nodes(mm), node_list)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2034:29: note: Assuming '__UNIQUE_ID___x238' is >= '__UNIQUE_ID___y239'
const unsigned int count = min(4096u, max_iterations);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/gpu/drm/selftests/test-drm_mm.c:2034:29: note: '?' condition is false
const unsigned int count = min(4096u, max_iterations);
--
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/mtd/devices/block2mtd.c:74:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_address(page), 0xff, PAGE_SIZE);
^~~~~~
drivers/mtd/devices/block2mtd.c:74:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_address(page), 0xff, PAGE_SIZE);
^~~~~~
drivers/mtd/devices/block2mtd.c:124:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, page_address(page) + offset, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:124:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, page_address(page) + offset, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:160:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page) + offset, buf, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:160:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page) + offset, buf, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:402:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(str, val);
^~~~~~
drivers/mtd/devices/block2mtd.c:402:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(str, val);
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/usb/musb/musb_debugfs.c:171:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:171:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:271:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0x00, sizeof(buf));
^~~~~~
drivers/usb/musb/musb_debugfs.c:271:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0x00, sizeof(buf));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
drivers/usb/typec/class.c:103:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->id_header);
^~~~~~~
drivers/usb/typec/class.c:103:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->id_header);
^~~~~~~
drivers/usb/typec/class.c:112:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->cert_stat);
^~~~~~~
drivers/usb/typec/class.c:112:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->cert_stat);
^~~~~~~
drivers/usb/typec/class.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", id->product);
^~~~~~~
drivers/usb/typec/class.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", id->product);
^~~~~~~
drivers/usb/typec/class.c:303:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dir, sizeof(dir), "mode%d", adev->mode);
^~~~~~~~
drivers/usb/typec/class.c:303:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dir, sizeof(dir), "mode%d", adev->mode);
^~~~~~~~
drivers/usb/typec/class.c:335:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", alt->vdo);
^~~~~~~
drivers/usb/typec/class.c:335:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", alt->vdo);
^~~~~~~
>> drivers/usb/typec/class.c:344:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/class.c:344:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/class.c:353:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->active ? "yes" : "no");
^~~~~~~
drivers/usb/typec/class.c:353:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->active ? "yes" : "no");
^~~~~~~
drivers/usb/typec/class.c:404:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "source\n");
^~~~~~~
drivers/usb/typec/class.c:404:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "source\n");
^~~~~~~
drivers/usb/typec/class.c:407:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "sink\n");
^~~~~~~
drivers/usb/typec/class.c:407:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "sink\n");
^~~~~~~
drivers/usb/typec/class.c:411:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "source sink\n");
^~~~~~~
drivers/usb/typec/class.c:411:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "source sink\n");
^~~~~~~
drivers/usb/typec/class.c:423:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", adev->mode);
^~~~~~~
drivers/usb/typec/class.c:423:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", adev->mode);
^~~~~~~
drivers/usb/typec/class.c:432:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%04x\n", adev->svid);
^~~~~~~
drivers/usb/typec/class.c:432:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%04x\n", adev->svid);
^~~~~~~
drivers/usb/typec/class.c:528:13: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
alt->roles = desc->roles;
^
drivers/usb/typec/class.c:1940:6: note: Assuming 'altmodes_node' is non-null
if (!altmodes_node)
^~~~~~~~~~~~~~
drivers/usb/typec/class.c:1940:2: note: Taking false branch
if (!altmodes_node)
^
drivers/usb/typec/class.c:1943:2: note: Loop condition is true. Entering loop body
fwnode_for_each_child_node(altmodes_node, child) {
^
include/linux/property.h:101:2: note: expanded from macro 'fwnode_for_each_child_node'
for (child = fwnode_get_next_child_node(fwnode, NULL); child; \
^
drivers/usb/typec/class.c:1945:7: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/usb/typec/class.c:1945:3: note: Taking false branch
if (ret) {
^
drivers/usb/typec/class.c:1952:7: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/usb/typec/class.c:1952:3: note: Taking false branch
if (ret) {
^
drivers/usb/typec/class.c:1958:7: note: Assuming 'index' is < 'n'
if (index >= n) {
^~~~~~~~~~
drivers/usb/typec/class.c:1958:3: note: Taking false branch
if (index >= n) {
^
drivers/usb/typec/class.c:1967:9: note: Calling 'typec_port_register_altmode'
alt = typec_port_register_altmode(port, &desc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/typec/class.c:1915:2: note: Taking false branch
if (IS_ERR(mux))
^
drivers/usb/typec/class.c:1918:9: note: Calling 'typec_register_altmode'
adev = typec_register_altmode(&port->dev, desc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/typec/class.c:519:8: note: Calling 'kzalloc'
alt = kzalloc(sizeof(*alt), GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Calling 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:569:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:586:2: note: Returning pointer, which participates in a condition later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Returning from 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:2: note: Returning pointer, which participates in a condition later
return kmalloc(size, flags | __GFP_ZERO);
--
^
drivers/media/dvb-frontends/ds3000.c:24:2: note: expanded from macro 'dprintk'
do { \
^
drivers/media/dvb-frontends/ds3000.c:699:15: note: Assuming 'i' is >= field 'msg_len'
for (i = 0 ; i < d->msg_len;) {
^~~~~~~~~~~~~~
drivers/media/dvb-frontends/ds3000.c:699:2: note: Loop condition is false. Execution continues on line 706
for (i = 0 ; i < d->msg_len;) {
^
drivers/media/dvb-frontends/ds3000.c:711:2: note: Loop condition is false. Execution continues on line 714
for (i = 0; i < d->msg_len; i++)
^
drivers/media/dvb-frontends/ds3000.c:720:28: note: The result of the left shift is undefined because the left operand is negative
data |= ((d->msg_len - 1) << 3) | 0x07;
~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/ds3000.c:850:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ds3000_ops,
^~~~~~
drivers/media/dvb-frontends/ds3000.c:850:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ds3000_ops,
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/media/tuners/tda18250.c:445:11: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
lopd = 1 << (exp - 1);
^ ~~~~~~~~~
drivers/media/tuners/tda18250.c:439:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/media/tuners/tda18250.c:439:2: note: Taking false branch
if (ret)
^
drivers/media/tuners/tda18250.c:443:6: note: Assuming 'exp' is > 5
if (exp > 5)
^~~~~~~
drivers/media/tuners/tda18250.c:443:2: note: Taking true branch
if (exp > 5)
^
drivers/media/tuners/tda18250.c:445:11: note: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'int'
lopd = 1 << (exp - 1);
^ ~~~~~~~~~
drivers/media/tuners/tda18250.c:695:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_write_bits(dev->regmap, R46_CPUMP, 0x07, buf[2]);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/tda18250.c:695:2: note: Value stored to 'ret' is never read
ret = regmap_write_bits(dev->regmap, R46_CPUMP, 0x07, buf[2]);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/tda18250.c:845:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &tda18250_ops,
^~~~~~
drivers/media/tuners/tda18250.c:845:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &tda18250_ops,
^~~~~~
drivers/media/tuners/tda18250.c:866:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fe->ops.tuner_ops, 0, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/tda18250.c:866:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fe->ops.tuner_ops, 0, sizeof(struct dvb_tuner_ops));
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/input/misc/yealink.c:288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:305:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p->data, &buf[ix], len);
^~~~~~
drivers/input/misc/yealink.c:305:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p->data, &buf[ix], len);
^~~~~~
drivers/input/misc/yealink.c:321:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:321:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:516:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:516:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(yld->ctl_data, 0, sizeof(*(yld->ctl_data)));
^~~~~~
drivers/input/misc/yealink.c:558:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &map_seg7, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:558:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &map_seg7, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:567:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&map_seg7, buf, sizeof(map_seg7));
^~~~~~
drivers/input/misc/yealink.c:567:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&map_seg7, buf, sizeof(map_seg7));
^~~~~~
>> drivers/input/misc/yealink.c:691:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(&buf[ret], "%s %s\n",
^~~~~~~
drivers/input/misc/yealink.c:691:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(&buf[ret], "%s %s\n",
^~~~~~~
drivers/input/misc/yealink.c:979:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = sysfs_create_group(&intf->dev.kobj, &yld_attr_group);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/misc/yealink.c:979:2: note: Value stored to 'ret' is never read
ret = sysfs_create_group(&intf->dev.kobj, &yld_attr_group);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
fs/xfs/xfs_bmap_item.c:579:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:579:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
fs/xfs/xfs_buf_item_recover.c:505:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xfs_buf_offset(bp,
^~~~~~
fs/xfs/xfs_buf_item_recover.c:505:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(xfs_buf_offset(bp,
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
fs/xfs/xfs_dquot_item_recover.c:148:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
fs/xfs/xfs_dquot_item_recover.c:148:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
fs/cifs/fs_context.c:307:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_ctx, ctx, sizeof(*ctx));
^~~~~~
fs/cifs/fs_context.c:307:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_ctx, ctx, sizeof(*ctx));
^~~~~~
fs/cifs/fs_context.c:601:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(key + len, options);
^~~~~~
fs/cifs/fs_context.c:601:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(key + len, options);
^~~~~~
fs/cifs/fs_context.c:1225:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->source_rfc1001_name, 0x20,
^~~~~~
fs/cifs/fs_context.c:1225:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->source_rfc1001_name, 0x20,
^~~~~~
fs/cifs/fs_context.c:1246:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->target_rfc1001_name, 0x20,
^~~~~~
fs/cifs/fs_context.c:1246:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->target_rfc1001_name, 0x20,
^~~~~~
fs/cifs/fs_context.c:1492:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->source_rfc1001_name, 0x20, RFC1001_NAME_LEN);
^~~~~~
fs/cifs/fs_context.c:1492:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->source_rfc1001_name, 0x20, RFC1001_NAME_LEN);
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/pcmcia/socket_sysfs.c:162:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "0x%x\n", &mask);
^~~~~~
drivers/pcmcia/socket_sysfs.c:162:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "0x%x\n", &mask);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/pcmcia/ds.c:105:11: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:105:11: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:121:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dynid->id.prod_id_hash, prod_id_hash, sizeof(__u32) * 4);
--
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:159:6: note: Assuming field 'start' is non-null
if (!iter.start) {
^~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:159:2: note: Taking false branch
if (!iter.start) {
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:186:6: note: 'n_bomap_pages' is 0
if (n_bomap_pages) {
^~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:186:2: note: Taking false branch
if (n_bomap_pages) {
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:196:14: note: Assuming 'i' is < field 'nr_bos'
for (i = 0; i < submit->nr_bos; i++) {
^~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:196:2: note: Loop condition is true. Entering loop body
for (i = 0; i < submit->nr_bos; i++) {
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:207:8: note: Calling 'IS_ERR'
if (!IS_ERR(pages)) {
^~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:207:8: note: Returning from 'IS_ERR'
if (!IS_ERR(pages)) {
^~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:207:3: note: Taking true branch
if (!IS_ERR(pages)) {
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:212:16: note: Assuming the condition is true
for (j = 0; j < obj->base.size >> PAGE_SHIFT; j++)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:212:4: note: Loop condition is true. Entering loop body
for (j = 0; j < obj->base.size >> PAGE_SHIFT; j++)
^
drivers/gpu/drm/etnaviv/etnaviv_dump.c:213:6: note: Null pointer value stored to 'bomap'
*bomap++ = cpu_to_le64(page_to_phys(*pages++));
^~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:213:14: note: Dereference of null pointer
*bomap++ = cpu_to_le64(page_to_phys(*pages++));
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:220:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iter.data, vaddr, obj->base.size);
^~~~~~
drivers/gpu/drm/etnaviv/etnaviv_dump.c:220:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iter.data, vaddr, obj->base.size);
^~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
drivers/media/usb/dvb-usb-v2/anysee.c:44:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->buf[0], sbuf, slen);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:44:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->buf[0], sbuf, slen);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:97:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rbuf, state->buf, rlen);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:97:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rbuf, state->buf, rlen);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:227:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[4], msg[i].buf, msg[i].len);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:227:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[4], msg[i].buf, msg[i].len);
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:1029:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&adap->fe[1]->ops.tuner_ops,
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:1029:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&adap->fe[1]->ops.tuner_ops,
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:1065:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&adap->fe[1]->ops.tuner_ops,
^~~~~~
drivers/media/usb/dvb-usb-v2/anysee.c:1065:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&adap->fe[1]->ops.tuner_ops,
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
>> drivers/usb/typec/bus.c:301:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
drivers/usb/typec/bus.c:301:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", alt->desc ? alt->desc : "");
^~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/usb/typec/altmodes/displayport.c:396:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = sprintf(buf, "%s ", cur ? "USB" : "[USB]");
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:396:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len = sprintf(buf, "%s ", cur ? "USB" : "[USB]");
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:400:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "[%s] ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:400:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "[%s] ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:403:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:403:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s ", configurations[i]);
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:496:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "[%s] ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:496:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "[%s] ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:499:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s ",
^~~~~~~
drivers/usb/typec/altmodes/displayport.c:499:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s ",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
fs/btrfs/send.c:429:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp_buf, p->buf, old_buf_len);
^~~~~~
fs/btrfs/send.c:429:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp_buf, p->buf, old_buf_len);
^~~~~~
fs/btrfs/send.c:446:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p->start, tmp_buf, path_len + 1);
^~~~~~~
fs/btrfs/send.c:446:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(p->start, tmp_buf, path_len + 1);
^~~~~~~
fs/btrfs/send.c:492:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prepared, name, name_len);
^~~~~~
fs/btrfs/send.c:492:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prepared, name, name_len);
^~~~~~
fs/btrfs/send.c:506:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prepared, p2->start, p2->end - p2->start);
^~~~~~
fs/btrfs/send.c:506:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prepared, p2->start, p2->end - p2->start);
^~~~~~
fs/btrfs/send.c:554:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p->start, tmp, len + 1);
^~~~~~~
fs/btrfs/send.c:554:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(p->start, tmp, len + 1);
^~~~~~~
fs/btrfs/send.c:605:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hdr + 1, data, len);
^~~~~~
fs/btrfs/send.c:605:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hdr + 1, data, len);
^~~~~~
fs/btrfs/send.c:1058:2: warning: Value stored to 'len' is never read [clang-analyzer-deadcode.DeadStores]
len = 0;
^ ~
fs/btrfs/send.c:1058:2: note: Value stored to 'len' is never read
len = 0;
^ ~
fs/btrfs/send.c:1130:2: warning: Potential leak of memory pointed to by 'buf' [clang-analyzer-unix.Malloc]
return ret;
^
fs/btrfs/send.c:7085:6: note: Assuming 'left_path' is non-null
if (!left_path) {
^~~~~~~~~~
fs/btrfs/send.c:7085:2: note: Taking false branch
if (!left_path) {
^
fs/btrfs/send.c:7090:6: note: Assuming 'right_path' is non-null
if (!right_path) {
^~~~~~~~~~~
fs/btrfs/send.c:7090:2: note: Taking false branch
if (!right_path) {
^
fs/btrfs/send.c:7096:6: note: Assuming 'tmp_buf' is non-null
if (!tmp_buf) {
^~~~~~~~
fs/btrfs/send.c:7096:2: note: Taking false branch
if (!tmp_buf) {
^
fs/btrfs/send.c:7154:6: note: Assuming the condition is false
if (!left_path->nodes[left_level]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/send.c:7154:2: note: Taking false branch
if (!left_path->nodes[left_level]) {
--
^
drivers/media/i2c/ov5647.c:811:3: note: Loop condition is false. Exiting loop
dev_dbg(dev, "software standby failed\n");
^
include/linux/dev_printk.h:155:2: note: expanded from macro 'dev_dbg'
dynamic_dev_dbg(dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dynamic_debug.h:166:2: note: expanded from macro 'dynamic_dev_dbg'
_dynamic_func_call(fmt,__dynamic_dev_dbg, \
^
include/linux/dynamic_debug.h:152:2: note: expanded from macro '_dynamic_func_call'
__dynamic_func_call(__UNIQUE_ID(ddebug), fmt, func, ##__VA_ARGS__)
^
include/linux/dynamic_debug.h:131:49: note: expanded from macro '__dynamic_func_call'
#define __dynamic_func_call(id, fmt, func, ...) do { \
^
drivers/media/i2c/ov5647.c:813:8: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
rdval &= ~0x01;
~~~~~ ^
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/media/dvb-frontends/ves1x93.c:493:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ves1x93_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/ves1x93.c:493:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ves1x93_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/usb/storage/onetouch.c:213:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(onetouch->name, sizeof(onetouch->name),
^~~~~~~~
drivers/usb/storage/onetouch.c:213:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(onetouch->name, sizeof(onetouch->name),
^~~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
drivers/usb/storage/sddr09.c:240:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, ecc, 3);
^~~~~~
drivers/usb/storage/sddr09.c:240:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, ecc, 3);
^~~~~~
drivers/usb/storage/sddr09.c:352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:528:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:528:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:717:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:717:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:796:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, len);
^~~~~~
drivers/usb/storage/sddr09.c:796:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, len);
^~~~~~
drivers/usb/storage/sddr09.c:922:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bptr, xptr, info->pagesize);
^~~~~~
drivers/usb/storage/sddr09.c:922:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bptr, xptr, info->pagesize);
^~~~~~
drivers/usb/storage/sddr09.c:1076:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:1076:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(command, 0, 12);
^~~~~~
drivers/usb/storage/sddr09.c:1106:3: warning: Value stored to 'wp_fmt' is never read [clang-analyzer-deadcode.DeadStores]
wp_fmt = " WP";
^ ~~~~~
drivers/usb/storage/sddr09.c:1106:3: note: Value stored to 'wp_fmt' is never read
wp_fmt = " WP";
^ ~~~~~
drivers/usb/storage/sddr09.c:1108:3: warning: Value stored to 'wp_fmt' is never read [clang-analyzer-deadcode.DeadStores]
wp_fmt = "";
^ ~~
drivers/usb/storage/sddr09.c:1108:3: note: Value stored to 'wp_fmt' is never read
wp_fmt = "";
^ ~~
drivers/usb/storage/sddr09.c:1153:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt, "sddr09: Found Flash card, ID = %4ph", deviceID);
^~~~~~~
drivers/usb/storage/sddr09.c:1153:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt, "sddr09: Found Flash card, ID = %4ph", deviceID);
^~~~~~~
>> drivers/usb/storage/sddr09.c:1156:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1156:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1168:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1168:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1171:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1171:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1177:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1177:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1183:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1183:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1188:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1188:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(blurbtxt + strlen(blurbtxt),
^~~~~~~
drivers/usb/storage/sddr09.c:1563:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, 18);
^~~~~~
drivers/usb/storage/sddr09.c:1563:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, 18);
^~~~~~
drivers/usb/storage/sddr09.c:1581:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, inquiry_response, 8);
^~~~~~
drivers/usb/storage/sddr09.c:1581:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, inquiry_response, 8);
^~~~~~
drivers/usb/storage/sddr09.c:1639:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, mode_page_01, sizeof(mode_page_01));
^~~~~~
drivers/usb/storage/sddr09.c:1639:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, mode_page_01, sizeof(mode_page_01));
^~~~~~
drivers/usb/storage/sddr09.c:1705:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ptr+strlen(ptr), "%02X ", srb->cmnd[i]);
^~~~~~~
drivers/usb/storage/sddr09.c:1705:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ptr+strlen(ptr), "%02X ", srb->cmnd[i]);
^~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/ata/libata-core.c:92:8: warning: Excessive padding in 'struct ata_force_param' (4 padding bytes, where 0 is optimal).
Optimal fields order:
name,
xfer_mask,
horkage_on,
horkage_off,
lflags,
cbl,
spd_limit,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct ata_force_param {
~~~~~~~^~~~~~~~~~~~~~~~~
drivers/ata/libata-core.c:92:8: note: Excessive padding in 'struct ata_force_param' (4 padding bytes, where 0 is optimal). Optimal fields order: name, xfer_mask, horkage_on, horkage_off, lflags, cbl, spd_limit, consider reordering the fields or adding explicit padding members
struct ata_force_param {
~~~~~~~^~~~~~~~~~~~~~~~~
drivers/ata/libata-core.c:1512:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qc->cdb, cdb, ATAPI_CDB_LEN);
^~~~~~
drivers/ata/libata-core.c:1512:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qc->cdb, cdb, ATAPI_CDB_LEN);
^~~~~~
drivers/ata/libata-core.c:2114:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmds, ap->sector_buf, ATA_LOG_NCQ_SEND_RECV_SIZE);
^~~~~~
drivers/ata/libata-core.c:2114:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmds, ap->sector_buf, ATA_LOG_NCQ_SEND_RECV_SIZE);
^~~~~~
drivers/ata/libata-core.c:2139:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmds, ap->sector_buf, ATA_LOG_NCQ_NON_DATA_SIZE);
^~~~~~
drivers/ata/libata-core.c:2139:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmds, ap->sector_buf, ATA_LOG_NCQ_NON_DATA_SIZE);
^~~~~~
drivers/ata/libata-core.c:2205:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(desc, desc_sz, "NCQ (not used)");
^~~~~~~~
drivers/ata/libata-core.c:2205:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(desc, desc_sz, "NCQ (not used)");
--
^~~~~~
net/tls/tls_main.c:390:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypto_info_aes_gcm_128->iv,
^~~~~~
net/tls/tls_main.c:393:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypto_info_aes_gcm_128->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:393:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypto_info_aes_gcm_128->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:414:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypto_info_aes_gcm_256->iv,
^~~~~~
net/tls/tls_main.c:414:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypto_info_aes_gcm_256->iv,
^~~~~~
net/tls/tls_main.c:417:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypto_info_aes_gcm_256->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:417:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypto_info_aes_gcm_256->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:436:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(aes_ccm_128->iv,
^~~~~~
net/tls/tls_main.c:436:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(aes_ccm_128->iv,
^~~~~~
net/tls/tls_main.c:439:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(aes_ccm_128->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:439:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(aes_ccm_128->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:457:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chacha20_poly1305->iv,
^~~~~~
net/tls/tls_main.c:457:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chacha20_poly1305->iv,
^~~~~~
net/tls/tls_main.c:460:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chacha20_poly1305->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:460:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chacha20_poly1305->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:478:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm4_gcm_info->iv,
^~~~~~
net/tls/tls_main.c:478:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm4_gcm_info->iv,
^~~~~~
net/tls/tls_main.c:481:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm4_gcm_info->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:481:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm4_gcm_info->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:498:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm4_ccm_info->iv,
^~~~~~
net/tls/tls_main.c:498:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm4_ccm_info->iv,
^~~~~~
net/tls/tls_main.c:501:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm4_ccm_info->rec_seq, cctx->rec_seq,
^~~~~~
net/tls/tls_main.c:501:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm4_ccm_info->rec_seq, cctx->rec_seq,
^~~~~~
Suppressed 98 warnings (98 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
82 warnings generated.
drivers/infiniband/core/sysfs.c:590:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, out_mad->data + offset, size);
^~~~~~
drivers/infiniband/core/sysfs.c:590:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, out_mad->data + offset, size);
^~~~~~
drivers/infiniband/core/sysfs.c:1111:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(element->name, sizeof(element->name), "%d", i) >=
^~~~~~~~
drivers/infiniband/core/sysfs.c:1111:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(element->name, sizeof(element->name), "%d", i) >=
^~~~~~~~
drivers/infiniband/core/sysfs.c:1368:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(desc.node_desc, buf, min_t(int, count, IB_DEVICE_NODE_DESC_MAX));
^~~~~~
drivers/infiniband/core/sysfs.c:1368:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(desc.node_desc, buf, min_t(int, count, IB_DEVICE_NODE_DESC_MAX));
^~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
drivers/infiniband/core/device.c:425:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = rename_compat_devs(ibdev);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/infiniband/core/device.c:425:2: note: Value stored to 'ret' is never read
ret = rename_compat_devs(ibdev);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/infiniband/core/device.c:465:7: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(dev_name(&device->dev), name, &i) != 1)
^~~~~~
drivers/infiniband/core/device.c:465:7: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(dev_name(&device->dev), name, &i) != 1)
^~~~~~
drivers/infiniband/core/device.c:469:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof buf, name, i);
^~~~~~~~
drivers/infiniband/core/device.c:469:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof buf, name, i);
^~~~~~~~
drivers/infiniband/core/device.c:1249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&device->attrs, 0, sizeof(device->attrs));
^~~~~~
drivers/infiniband/core/device.c:1249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&device->attrs, 0, sizeof(device->attrs));
^~~~~~
drivers/infiniband/core/device.c:2019:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2019:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2057:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
drivers/infiniband/core/device.c:2057:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port_attr, 0, sizeof(*port_attr));
^~~~~~
Suppressed 93 warnings (93 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
drivers/mcb/mcb-parse.c:210:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(bus->name, CHAMELEON_FILENAME_LEN + 1, "%s",
^~~~~~~~
drivers/mcb/mcb-parse.c:210:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(bus->name, CHAMELEON_FILENAME_LEN + 1, "%s",
^~~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
net/sched/sch_mq.c:136:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sch->qstats, 0, sizeof(sch->qstats));
^~~~~~
net/sched/sch_mq.c:136:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sch->qstats, 0, sizeof(sch->qstats));
^~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
80 warnings generated.
net/rxrpc/sendmsg.c:547:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&p->call.timeouts, CMSG_DATA(cmsg), len);
^~~~~~
net/rxrpc/sendmsg.c:547:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&p->call.timeouts, CMSG_DATA(cmsg), len);
^~~~~~
net/rxrpc/sendmsg.c:598:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cp, 0, sizeof(cp));
^~~~~~
net/rxrpc/sendmsg.c:598:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cp, 0, sizeof(cp));
^~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
net/rxrpc/server_key.c:78:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(prep->orig_description, "%u:%u%n", &service, &sec_class, &n) != 2)
^~~~~~
net/rxrpc/server_key.c:78:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(prep->orig_description, "%u:%u%n", &service, &sec_class, &n) != 2)
^~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5720:30: note: Left side of '&&' is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^
net/netfilter/nf_tables_api.c:5723:6: note: Assuming 'flags' is equal to 0
if (flags != 0)
^~~~~~~~~~
net/netfilter/nf_tables_api.c:5723:2: note: Taking false branch
if (flags != 0)
^
net/netfilter/nf_tables_api.c:5726:6: note: Assuming the condition is false
if (set->flags & NFT_SET_MAP) {
^~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5726:2: note: Taking false branch
if (set->flags & NFT_SET_MAP) {
^
net/netfilter/nf_tables_api.c:5731:7: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_DATA] != NULL)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5731:3: note: Taking false branch
if (nla[NFTA_SET_ELEM_DATA] != NULL)
^
net/netfilter/nf_tables_api.c:5735:42: note: Left side of '&&' is false
if ((flags & NFT_SET_ELEM_INTERVAL_END) &&
^
net/netfilter/nf_tables_api.c:5746:6: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_TIMEOUT] != NULL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5746:2: note: Taking false branch
if (nla[NFTA_SET_ELEM_TIMEOUT] != NULL) {
^
net/netfilter/nf_tables_api.c:5753:13: note: Assuming the condition is false
} else if (set->flags & NFT_SET_TIMEOUT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5753:9: note: Taking false branch
} else if (set->flags & NFT_SET_TIMEOUT) {
^
net/netfilter/nf_tables_api.c:5758:6: note: Assuming the condition is false
if (nla[NFTA_SET_ELEM_EXPIRATION] != NULL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5758:2: note: Taking false branch
if (nla[NFTA_SET_ELEM_EXPIRATION] != NULL) {
^
net/netfilter/nf_tables_api.c:5767:6: note: Assuming the condition is true
if (nla[NFTA_SET_ELEM_EXPR]) {
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5767:2: note: Taking true branch
if (nla[NFTA_SET_ELEM_EXPR]) {
^
net/netfilter/nf_tables_api.c:5770:7: note: Assuming field 'num_exprs' is 0
if (set->num_exprs && set->num_exprs != 1)
^~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5770:22: note: Left side of '&&' is false
if (set->num_exprs && set->num_exprs != 1)
^
net/netfilter/nf_tables_api.c:5773:10: note: Calling 'nft_set_elem_expr_alloc'
expr = nft_set_elem_expr_alloc(ctx, set,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5332:9: note: Calling 'nft_expr_init'
expr = nft_expr_init(ctx, attr);
^~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2795:8: note: Calling 'nf_tables_expr_parse'
err = nf_tables_expr_parse(ctx, nla, &expr_info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2714:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:2714:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:2718:2: note: Taking true branch
if (IS_ERR(type))
^
net/netfilter/nf_tables_api.c:2719:3: note: Returning without writing to 'info->ops'
return PTR_ERR(type);
^
net/netfilter/nf_tables_api.c:2795:8: note: Returning from 'nf_tables_expr_parse'
err = nf_tables_expr_parse(ctx, nla, &expr_info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:2796:6: note: 'err' is >= 0
if (err < 0)
^~~
net/netfilter/nf_tables_api.c:2796:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:2800:17: note: Access to field 'size' results in a dereference of an undefined pointer value (loaded from field 'ops')
expr = kzalloc(expr_info.ops->size, GFP_KERNEL);
^ ~~~
net/netfilter/nf_tables_api.c:2831:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, src->ops->size);
^~~~~~
net/netfilter/nf_tables_api.c:2831:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, src->ops->size);
^~~~~~
net/netfilter/nf_tables_api.c:3012:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cb->args[1], 0,
^~~~~~
net/netfilter/nf_tables_api.c:3012:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cb->args[1], 0,
^~~~~~
>> net/netfilter/nf_tables_api.c:3804:9: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!sscanf(i->name, name, &tmp))
^~~~~~
net/netfilter/nf_tables_api.c:3804:9: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!sscanf(i->name, name, &tmp))
^~~~~~
net/netfilter/nf_tables_api.c:3815:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(inuse, 0, PAGE_SIZE);
^~~~~~
net/netfilter/nf_tables_api.c:3815:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(inuse, 0, PAGE_SIZE);
^~~~~~
net/netfilter/nf_tables_api.c:4249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&desc, 0, sizeof(desc));
^~~~~~
net/netfilter/nf_tables_api.c:4249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&desc, 0, sizeof(desc));
^~~~~~
net/netfilter/nf_tables_api.c:5096:16: warning: The left operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (desc.type != NFT_DATA_VALUE || desc.len != set->klen) {
^
net/netfilter/nf_tables_api.c:6302:2: note: Taking false branch
if (IS_ERR(table)) {
^
net/netfilter/nf_tables_api.c:6308:2: note: Taking false branch
if (IS_ERR(set))
^
net/netfilter/nf_tables_api.c:6310:6: note: Assuming the condition is false
if (!list_empty(&set->bindings) && set->flags & NFT_SET_CONSTANT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6310:34: note: Left side of '&&' is false
if (!list_empty(&set->bindings) && set->flags & NFT_SET_CONSTANT)
^
net/netfilter/nf_tables_api.c:6315:6: note: Assuming the condition is false
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6315:2: note: Taking false branch
if (!nla[NFTA_SET_ELEM_LIST_ELEMENTS])
^
net/netfilter/nf_tables_api.c:6318:2: note: Loop condition is true. Entering loop body
nla_for_each_nested(attr, nla[NFTA_SET_ELEM_LIST_ELEMENTS], rem) {
^
include/net/netlink.h:1932:2: note: expanded from macro 'nla_for_each_nested'
nla_for_each_attr(pos, nla_data(nla), nla_len(nla), rem)
^
include/net/netlink.h:1921:2: note: expanded from macro 'nla_for_each_attr'
for (pos = head, rem = len; \
^
net/netfilter/nf_tables_api.c:6319:9: note: Calling 'nft_del_setelem'
err = nft_del_setelem(&ctx, set, attr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6132:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:6132:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:6136:6: note: 'err' is >= 0
if (err < 0)
^~~
net/netfilter/nf_tables_api.c:6136:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:6139:6: note: Assuming the condition is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:6139:30: note: Left side of '&&' is false
if (!nla[NFTA_SET_ELEM_KEY] && !(flags & NFT_SET_ELEM_CATCHALL))
^
net/netfilter/nf_tables_api.c:6144:6: note: Assuming 'flags' is equal to 0
if (flags != 0)
^~~~~~~~~~
net/netfilter/nf_tables_api.c:6144:2: note: Taking false branch
if (flags != 0)
^
net/netfilter/nf_tables_api.c:6147:2: note: Taking true branch
if (nla[NFTA_SET_ELEM_KEY]) {
^
net/netfilter/nf_tables_api.c:6148:9: note: Calling 'nft_setelem_parse_key'
err = nft_setelem_parse_key(ctx, set, &elem.key.val,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:5092:8: note: Calling 'nft_data_init'
err = nft_data_init(ctx, key, NFT_DATA_VALUE_MAXLEN, &desc, attr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9555:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
net/netfilter/nf_tables_api.c:9555:2: note: Taking false branch
if (err < 0)
^
net/netfilter/nf_tables_api.c:9558:6: note: Assuming the condition is false
if (tb[NFTA_DATA_VALUE])
^~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9558:2: note: Taking false branch
if (tb[NFTA_DATA_VALUE])
^
net/netfilter/nf_tables_api.c:9561:6: note: Assuming the condition is true
if (tb[NFTA_DATA_VERDICT] && ctx != NULL)
^~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_tables_api.c:9561:6: note: Left side of '&&' is true
net/netfilter/nf_tables_api.c:9561:31: note: 'ctx' is not equal to NULL
--
^
include/linux/kdev_t.h:11:20: note: expanded from macro 'MINOR'
#define MINOR(dev) ((unsigned int) ((dev) & MINORMASK))
^
drivers/md/dm-table.c:362:3: note: Taking false branch
if (MAJOR(dev) != major || MINOR(dev) != minor)
^
drivers/md/dm-table.c:370:19: note: Passing null pointer value via 1st parameter 'l'
dd = find_device(&t->devices, dev);
^~~~~~~~~~~
drivers/md/dm-table.c:370:7: note: Calling 'find_device'
dd = find_device(&t->devices, dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-table.c:215:2: note: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'l')
list_for_each_entry (dd, l, list)
^
include/linux/list.h:638:13: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^ ~~~~
include/linux/list.h:531:2: note: expanded from macro 'list_first_entry'
list_entry((ptr)->next, type, member)
^ ~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^ ~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~
drivers/md/dm-table.c:359:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(path, "%u:%u%c", &major, &minor, &dummy) == 2) {
^~~~~~
drivers/md/dm-table.c:359:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(path, "%u:%u%c", &major, &minor, &dummy) == 2) {
^~~~~~
drivers/md/dm-table.c:491:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(argv, old_argv, *size * sizeof(*argv));
^~~~~~
drivers/md/dm-table.c:491:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(argv, old_argv, *size * sizeof(*argv));
^~~~~~
drivers/md/dm-table.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tgt, 0, sizeof(*tgt));
^~~~~~
drivers/md/dm-table.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tgt, 0, sizeof(*tgt));
^~~~~~
drivers/md/dm-table.c:743:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
(sscanf(arg_str, "%u%c", value, &dummy) != 1) ||
^~~~~~
drivers/md/dm-table.c:743:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
(sscanf(arg_str, "%u%c", value, &dummy) != 1) ||
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/leds/led-triggers.c:86:7: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsnprintf(NULL, 0, fmt, args);
^~~~~~~~~
drivers/leds/led-triggers.c:86:7: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
i = vsnprintf(NULL, 0, fmt, args);
^~~~~~~~~
drivers/leds/led-triggers.c:279:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy((char *)trig->name, name);
^~~~~~
drivers/leds/led-triggers.c:279:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy((char *)trig->name, name);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
Suppressed 98 warnings (98 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
101 warnings generated.
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
102 warnings generated.
drivers/usb/host/xhci-dbgcap.c:377:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbc->eps, 0, sizeof(struct dbc_ep) * ARRAY_SIZE(dbc->eps));
^~~~~~
drivers/usb/host/xhci-dbgcap.c:377:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dbc->eps, 0, sizeof(struct dbc_ep) * ARRAY_SIZE(dbc->eps));
^~~~~~
drivers/usb/host/xhci-dbgcap.c:828:4: warning: Value stored to 'ctrl' is never read [clang-analyzer-deadcode.DeadStores]
ctrl = readl(&dbc->regs->control);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/host/xhci-dbgcap.c:828:4: note: Value stored to 'ctrl' is never read
ctrl = readl(&dbc->regs->control);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/usb/host/xhci-dbgcap.c:1004:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", p);
^~~~~~~
drivers/usb/host/xhci-dbgcap.c:1004:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", p);
^~~~~~~
Suppressed 99 warnings (99 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
Suppressed 99 warnings (99 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
drivers/iio/adc/twl6030-gpadc.c:911:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = devm_request_threaded_irq(dev, irq, NULL,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/twl6030-gpadc.c:911:2: note: Value stored to 'ret' is never read
ret = devm_request_threaded_irq(dev, irq, NULL,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
drivers/iio/adc/xilinx-xadc-core.c:628:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, new_size);
^~~~~~
drivers/iio/adc/xilinx-xadc-core.c:628:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, new_size);
^~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/extcon/extcon-max8997.c:416:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = max8997_muic_handle_jig_uart(info, attached);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/extcon/extcon-max8997.c:416:3: note: Value stored to 'ret' is never read
ret = max8997_muic_handle_jig_uart(info, attached);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/staging/greybus/bootrom.c:166:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(firmware_name, sizeof(firmware_name),
^~~~~~~~
drivers/staging/greybus/bootrom.c:166:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(firmware_name, sizeof(firmware_name),
^~~~~~~~
drivers/staging/greybus/bootrom.c:291:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(firmware_response->data, fw->data + offset, size);
^~~~~~
drivers/staging/greybus/bootrom.c:291:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(firmware_response->data, fw->data + offset, size);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/iio/accel/bmc150-accel-core.c:896:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", wm);
^~~~~~~
drivers/iio/accel/bmc150-accel-core.c:896:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", wm);
vim +185 arch/mips/ath79/setup.c
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 42
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 43 static void __init ath79_detect_sys_type(void)
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 44 {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 45 char *chip = "????";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 46 u32 id;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 47 u32 major;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 48 u32 minor;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 49 u32 rev = 0;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 50 u32 ver = 1;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 51
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 52 id = ath79_reset_rr(AR71XX_RESET_REG_REV_ID);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 53 major = id & REV_ID_MAJOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 54
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 55 switch (major) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 56 case REV_ID_MAJOR_AR71XX:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 57 minor = id & AR71XX_REV_ID_MINOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 58 rev = id >> AR71XX_REV_ID_REVISION_SHIFT;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 59 rev &= AR71XX_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 60 switch (minor) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 61 case AR71XX_REV_ID_MINOR_AR7130:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 62 ath79_soc = ATH79_SOC_AR7130;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 63 chip = "7130";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 64 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 65
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 66 case AR71XX_REV_ID_MINOR_AR7141:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 67 ath79_soc = ATH79_SOC_AR7141;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 68 chip = "7141";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 69 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 70
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 71 case AR71XX_REV_ID_MINOR_AR7161:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 72 ath79_soc = ATH79_SOC_AR7161;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 73 chip = "7161";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 74 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 75 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 76 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 77
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 78 case REV_ID_MAJOR_AR7240:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 79 ath79_soc = ATH79_SOC_AR7240;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 80 chip = "7240";
8bed1288d479fd Gabor Juhos 2011-06-20 81 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 82 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 83
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 84 case REV_ID_MAJOR_AR7241:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 85 ath79_soc = ATH79_SOC_AR7241;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 86 chip = "7241";
8bed1288d479fd Gabor Juhos 2011-06-20 87 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 88 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 89
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 90 case REV_ID_MAJOR_AR7242:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 91 ath79_soc = ATH79_SOC_AR7242;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 92 chip = "7242";
8bed1288d479fd Gabor Juhos 2011-06-20 93 rev = id & AR724X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 94 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 95
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 96 case REV_ID_MAJOR_AR913X:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 97 minor = id & AR913X_REV_ID_MINOR_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 98 rev = id >> AR913X_REV_ID_REVISION_SHIFT;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 99 rev &= AR913X_REV_ID_REVISION_MASK;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 100 switch (minor) {
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 101 case AR913X_REV_ID_MINOR_AR9130:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 102 ath79_soc = ATH79_SOC_AR9130;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 103 chip = "9130";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 104 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 105
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 106 case AR913X_REV_ID_MINOR_AR9132:
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 107 ath79_soc = ATH79_SOC_AR9132;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 108 chip = "9132";
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 109 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 110 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 111 break;
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 112
80a7ed81a840ae Gabor Juhos 2012-03-14 113 case REV_ID_MAJOR_AR9330:
80a7ed81a840ae Gabor Juhos 2012-03-14 114 ath79_soc = ATH79_SOC_AR9330;
80a7ed81a840ae Gabor Juhos 2012-03-14 115 chip = "9330";
80a7ed81a840ae Gabor Juhos 2012-03-14 116 rev = id & AR933X_REV_ID_REVISION_MASK;
80a7ed81a840ae Gabor Juhos 2012-03-14 117 break;
80a7ed81a840ae Gabor Juhos 2012-03-14 118
80a7ed81a840ae Gabor Juhos 2012-03-14 119 case REV_ID_MAJOR_AR9331:
80a7ed81a840ae Gabor Juhos 2012-03-14 120 ath79_soc = ATH79_SOC_AR9331;
80a7ed81a840ae Gabor Juhos 2012-03-14 121 chip = "9331";
80a7ed81a840ae Gabor Juhos 2012-03-14 122 rev = id & AR933X_REV_ID_REVISION_MASK;
80a7ed81a840ae Gabor Juhos 2012-03-14 123 break;
80a7ed81a840ae Gabor Juhos 2012-03-14 124
d84114660a65e8 Gabor Juhos 2012-03-14 125 case REV_ID_MAJOR_AR9341:
d84114660a65e8 Gabor Juhos 2012-03-14 126 ath79_soc = ATH79_SOC_AR9341;
d84114660a65e8 Gabor Juhos 2012-03-14 127 chip = "9341";
d84114660a65e8 Gabor Juhos 2012-03-14 128 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 129 break;
d84114660a65e8 Gabor Juhos 2012-03-14 130
d84114660a65e8 Gabor Juhos 2012-03-14 131 case REV_ID_MAJOR_AR9342:
d84114660a65e8 Gabor Juhos 2012-03-14 132 ath79_soc = ATH79_SOC_AR9342;
d84114660a65e8 Gabor Juhos 2012-03-14 133 chip = "9342";
d84114660a65e8 Gabor Juhos 2012-03-14 134 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 135 break;
d84114660a65e8 Gabor Juhos 2012-03-14 136
d84114660a65e8 Gabor Juhos 2012-03-14 137 case REV_ID_MAJOR_AR9344:
d84114660a65e8 Gabor Juhos 2012-03-14 138 ath79_soc = ATH79_SOC_AR9344;
d84114660a65e8 Gabor Juhos 2012-03-14 139 chip = "9344";
d84114660a65e8 Gabor Juhos 2012-03-14 140 rev = id & AR934X_REV_ID_REVISION_MASK;
d84114660a65e8 Gabor Juhos 2012-03-14 141 break;
d84114660a65e8 Gabor Juhos 2012-03-14 142
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 143 case REV_ID_MAJOR_QCA9533_V2:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 144 ver = 2;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 145 ath79_soc_rev = 2;
c9b0299034665d Liangliang Huang 2020-05-04 146 fallthrough;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 147 case REV_ID_MAJOR_QCA9533:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 148 ath79_soc = ATH79_SOC_QCA9533;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 149 chip = "9533";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 150 rev = id & QCA953X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 151 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 152
2e6c91e392fd7b Gabor Juhos 2013-02-15 153 case REV_ID_MAJOR_QCA9556:
2e6c91e392fd7b Gabor Juhos 2013-02-15 154 ath79_soc = ATH79_SOC_QCA9556;
2e6c91e392fd7b Gabor Juhos 2013-02-15 155 chip = "9556";
2e6c91e392fd7b Gabor Juhos 2013-02-15 156 rev = id & QCA955X_REV_ID_REVISION_MASK;
2e6c91e392fd7b Gabor Juhos 2013-02-15 157 break;
2e6c91e392fd7b Gabor Juhos 2013-02-15 158
2e6c91e392fd7b Gabor Juhos 2013-02-15 159 case REV_ID_MAJOR_QCA9558:
2e6c91e392fd7b Gabor Juhos 2013-02-15 160 ath79_soc = ATH79_SOC_QCA9558;
2e6c91e392fd7b Gabor Juhos 2013-02-15 161 chip = "9558";
2e6c91e392fd7b Gabor Juhos 2013-02-15 162 rev = id & QCA955X_REV_ID_REVISION_MASK;
2e6c91e392fd7b Gabor Juhos 2013-02-15 163 break;
2e6c91e392fd7b Gabor Juhos 2013-02-15 164
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 165 case REV_ID_MAJOR_QCA956X:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 166 ath79_soc = ATH79_SOC_QCA956X;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 167 chip = "956X";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 168 rev = id & QCA956X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 169 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 170
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 171 case REV_ID_MAJOR_TP9343:
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 172 ath79_soc = ATH79_SOC_TP9343;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 173 chip = "9343";
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 174 rev = id & QCA956X_REV_ID_REVISION_MASK;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 175 break;
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 176
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 177 default:
ab75dc02c151c9 Ralf Baechle 2011-11-17 178 panic("ath79: unknown SoC, id:0x%08x", id);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 179 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 180
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 181 if (ver == 1)
be5f3623204e15 Gabor Juhos 2011-11-18 182 ath79_soc_rev = rev;
be5f3623204e15 Gabor Juhos 2011-11-18 183
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 184 if (soc_is_qca953x() || soc_is_qca955x() || soc_is_qca956x())
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 @185 sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u",
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 186 chip, ver, rev);
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 187 else if (soc_is_tp9343())
af2d1b521bfbc5 Matthias Schiffer 2018-07-20 188 sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u",
2e6c91e392fd7b Gabor Juhos 2013-02-15 189 chip, rev);
2e6c91e392fd7b Gabor Juhos 2013-02-15 190 else
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 191 sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 192 pr_info("SoC: %s\n", ath79_sys_type);
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 193 }
d4a67d9dc8a5a8 Gabor Juhos 2011-01-04 194
---
0-DAY CI Kernel Test Service
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-10 10:17 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-10 10:17 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 1768216 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc7 next-20220309]
[cannot apply to masahiroy-kbuild/for-next]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 9 days ago
:::::: commit date: 9 days ago
config: arm-randconfig-c002-20220301 (https://download.01.org/0day-ci/archive/20220310/202203101812.cBlOgUAf-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
init/main.c:643:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(static_command_line + xlen, command_line);
^~~~~~
init/main.c:643:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(static_command_line + xlen, command_line);
^~~~~~
init/main.c:655:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(saved_command_line + len, extra_init_args);
^~~~~~
init/main.c:655:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(saved_command_line + len, extra_init_args);
^~~~~~
init/main.c:657:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(saved_command_line + len,
^~~~~~
init/main.c:657:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(saved_command_line + len,
^~~~~~
init/main.c:661:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(saved_command_line + len, " -- ");
^~~~~~
init/main.c:661:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(saved_command_line + len, " -- ");
^~~~~~
init/main.c:663:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(saved_command_line + len, extra_init_args);
^~~~~~
init/main.c:663:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(saved_command_line + len, extra_init_args);
^~~~~~
init/main.c:917:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
end += sprintf(end, " %s", *p);
^~~~~~~
init/main.c:917:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
end += sprintf(end, " %s", *p);
^~~~~~~
init/main.c:919:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
end += sprintf(end, " %s", *p);
^~~~~~~
init/main.c:919:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
end += sprintf(end, " %s", *p);
^~~~~~~
init/main.c:1188:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(entry->buf, str_entry);
^~~~~~
init/main.c:1188:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(entry->buf, str_entry);
^~~~~~
init/main.c:1306:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(msgbuf, "preemption imbalance ");
^~~~~~~
init/main.c:1306:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(msgbuf, "preemption imbalance ");
^~~~~~~
init/main.c:1388:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(command_line, saved_command_line);
^~~~~~
init/main.c:1388:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(command_line, saved_command_line);
^~~~~~
Suppressed 51 warnings (48 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (8 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
arch/arm/kernel/devtree.c:232:6: warning: Access to field 'dt_fixup' results in a dereference of a null pointer (loaded from variable 'mdesc') [clang-analyzer-core.NullDereference]
if (mdesc->dt_fixup)
^~~~~
arch/arm/kernel/devtree.c:206:6: note: Assuming 'dt_virt' is non-null
if (!dt_virt || !early_init_dt_verify(dt_virt))
^~~~~~~~
arch/arm/kernel/devtree.c:206:6: note: Left side of '||' is false
arch/arm/kernel/devtree.c:206:18: note: Assuming the condition is false
if (!dt_virt || !early_init_dt_verify(dt_virt))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/devtree.c:206:2: note: Taking false branch
if (!dt_virt || !early_init_dt_verify(dt_virt))
^
arch/arm/kernel/devtree.c:209:2: note: Value assigned to 'mdesc'
mdesc = of_flat_dt_match_machine(mdesc_best, arch_get_next_mach);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/devtree.c:211:6: note: Assuming 'mdesc' is null
if (!mdesc) {
^~~~~~
arch/arm/kernel/devtree.c:211:2: note: Taking true branch
if (!mdesc) {
^
arch/arm/kernel/devtree.c:221:10: note: Assuming 'size' is <= 0
while (size > 0) {
^~~~~~~~
arch/arm/kernel/devtree.c:221:3: note: Loop condition is false. Execution continues on line 226
while (size > 0) {
^
arch/arm/kernel/devtree.c:232:6: note: Access to field 'dt_fixup' results in a dereference of a null pointer (loaded from variable 'mdesc')
if (mdesc->dt_fixup)
^~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> arch/arm/kernel/crash_dump.c:49:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/arm/kernel/crash_dump.c:49:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
fs/ecryptfs/main.c:215:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)mount_crypt_stat, 0,
^~~~~~
fs/ecryptfs/main.c:215:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)mount_crypt_stat, 0,
^~~~~~
fs/ecryptfs/main.c:299:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(cipher_name_dst, cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:299:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(cipher_name_dst, cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:331:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fnek_dst, fnek_src, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~~
fs/ecryptfs/main.c:331:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(fnek_dst, fnek_src, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~~
fs/ecryptfs/main.c:353:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fn_cipher_name_dst, fn_cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:353:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(fn_cipher_name_dst, fn_cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:401:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(mount_crypt_stat->global_default_fn_cipher_name,
^~~~~~
fs/ecryptfs/main.c:401:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mount_crypt_stat->global_default_fn_cipher_name,
^~~~~~
fs/ecryptfs/main.c:772:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK);
^~~~~~~~
fs/ecryptfs/main.c:772:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK);
^~~~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/debugfs/file.c:63:9: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
return fsd->real_fops;
^
fs/debugfs/file.c:252:6: note: Calling 'debugfs_file_get'
if (debugfs_file_get(dentry))
^~~~~~~~~~~~~~~~~~~~~~~~
fs/debugfs/file.c:87:10: note: Left side of '||' is false
d_fsd = READ_ONCE(dentry->d_fsdata);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
fs/debugfs/file.c:87:10: note: Left side of '||' is false
d_fsd = READ_ONCE(dentry->d_fsdata);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
fs/debugfs/file.c:87:10: note: Left side of '||' is true
d_fsd = READ_ONCE(dentry->d_fsdata);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:314:28: note: expanded from macro '__native_word'
sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
^
fs/debugfs/file.c:87:10: note: Taking false branch
d_fsd = READ_ONCE(dentry->d_fsdata);
--
^~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_bmap_btree.h:19:3: note: expanded from macro 'XFS_BMBT_BLOCK_LEN'
(xfs_has_crc(((mp))) ? \
^~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:419:14: note: '?' condition is false
new_size = XFS_BMAP_BROOT_SPACE_CALC(mp, new_max);
^
fs/xfs/libxfs/xfs_bmap_btree.h:68:8: note: expanded from macro 'XFS_BMAP_BROOT_SPACE_CALC'
(int)(XFS_BMBT_BLOCK_LEN(mp) + \
^
fs/xfs/libxfs/xfs_bmap_btree.h:19:3: note: expanded from macro 'XFS_BMBT_BLOCK_LEN'
(xfs_has_crc(((mp))) ? \
^
fs/xfs/libxfs/xfs_inode_fork.c:422:6: note: Assuming 'new_size' is <= 0
if (new_size > 0) {
^~~~~~~~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:422:2: note: Taking false branch
if (new_size > 0) {
^
fs/xfs/libxfs/xfs_inode_fork.c:430:3: note: Null pointer value stored to 'new_broot'
new_broot = NULL;
^~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:436:6: note: 'new_max' is > 0
if (new_max > 0) {
^~~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:436:2: note: Taking true branch
if (new_max > 0) {
^
fs/xfs/libxfs/xfs_inode_fork.c:440:16: note: '?' condition is false
op = (char *)XFS_BMBT_REC_ADDR(mp, ifp->if_broot, 1);
^
fs/xfs/libxfs/xfs_bmap_btree.h:25:4: note: expanded from macro 'XFS_BMBT_REC_ADDR'
XFS_BMBT_BLOCK_LEN(mp) + \
^
fs/xfs/libxfs/xfs_bmap_btree.h:19:3: note: expanded from macro 'XFS_BMBT_BLOCK_LEN'
(xfs_has_crc(((mp))) ? \
^
fs/xfs/libxfs/xfs_inode_fork.c:441:16: note: '?' condition is false
np = (char *)XFS_BMBT_REC_ADDR(mp, new_broot, 1);
^
fs/xfs/libxfs/xfs_bmap_btree.h:25:4: note: expanded from macro 'XFS_BMBT_REC_ADDR'
XFS_BMBT_BLOCK_LEN(mp) + \
^
fs/xfs/libxfs/xfs_bmap_btree.h:19:3: note: expanded from macro 'XFS_BMBT_BLOCK_LEN'
(xfs_has_crc(((mp))) ? \
^
fs/xfs/libxfs/xfs_inode_fork.c:441:3: note: Null pointer value stored to 'np'
np = (char *)XFS_BMBT_REC_ADDR(mp, new_broot, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:442:3: note: Null pointer passed as 1st argument to memory copy function
memcpy(np, op, new_max * (uint)sizeof(xfs_bmbt_rec_t));
^ ~~
fs/xfs/libxfs/xfs_inode_fork.c:451:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(np, op, new_max * (uint)sizeof(xfs_fsblock_t));
^~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:451:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(np, op, new_max * (uint)sizeof(xfs_fsblock_t));
^~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:617:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cp, ifp->if_u1.if_data, ifp->if_bytes);
^~~~~~
fs/xfs/libxfs/xfs_inode_fork.c:617:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cp, ifp->if_u1.if_data, ifp->if_bytes);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/proc/proc_sysctl.c:980:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_name, name, namelen);
^~~~~~
fs/proc/proc_sysctl.c:980:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_name, name, namelen);
^~~~~~
fs/proc/proc_sysctl.c:1197:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(link_name, entry->procname, len);
^~~~~~
fs/proc/proc_sysctl.c:1197:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(link_name, entry->procname, len);
^~~~~~
fs/proc/proc_sysctl.c:1231:3: warning: Value stored to 'link' is never read [clang-analyzer-deadcode.DeadStores]
link = find_entry(&head, dir, procname, strlen(procname));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/proc/proc_sysctl.c:1231:3: note: Value stored to 'link' is never read
link = find_entry(&head, dir, procname, strlen(procname));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/proc/proc_sysctl.c:1442:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pos, name, namelen);
^~~~~~
fs/proc/proc_sysctl.c:1442:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pos, name, namelen);
^~~~~~
fs/proc/proc_sysctl.c:1752:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(set, 0, sizeof(*set));
^~~~~~
fs/proc/proc_sysctl.c:1752:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(set, 0, sizeof(*set));
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> arch/arm/mm/ioremap.c:124:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pgd_offset(mm, VMALLOC_START),
^~~~~~
arch/arm/mm/ioremap.c:124:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pgd_offset(mm, VMALLOC_START),
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> arch/arm/mm/pgd.c:42:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_pgd, 0, USER_PTRS_PER_PGD * sizeof(pgd_t));
^~~~~~
arch/arm/mm/pgd.c:42:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_pgd, 0, USER_PTRS_PER_PGD * sizeof(pgd_t));
^~~~~~
>> arch/arm/mm/pgd.c:48:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_pgd + USER_PTRS_PER_PGD, init_pgd + USER_PTRS_PER_PGD,
^~~~~~
arch/arm/mm/pgd.c:48:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_pgd + USER_PTRS_PER_PGD, init_pgd + USER_PTRS_PER_PGD,
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (43 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
kernel/utsname_sysctl.c:39:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&uts_table, table, sizeof(uts_table));
^~~~~~
kernel/utsname_sysctl.c:39:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&uts_table, table, sizeof(uts_table));
^~~~~~
kernel/utsname_sysctl.c:49:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp_data, get_uts(table), sizeof(tmp_data));
^~~~~~
kernel/utsname_sysctl.c:49:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp_data, get_uts(table), sizeof(tmp_data));
^~~~~~
kernel/utsname_sysctl.c:61:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(get_uts(table), tmp_data, sizeof(tmp_data));
^~~~~~
kernel/utsname_sysctl.c:61:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(get_uts(table), tmp_data, sizeof(tmp_data));
^~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
kernel/taskstats.c:120:2: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = 0;
^ ~
kernel/taskstats.c:120:2: note: Value stored to 'rc' is never read
rc = 0;
^ ~
kernel/taskstats.c:159:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:159:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:210:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stats, first->signal->stats, sizeof(*stats));
^~~~~~
kernel/taskstats.c:210:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stats, first->signal->stats, sizeof(*stats));
^~~~~~
kernel/taskstats.c:212:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:212:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:420:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:420:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
kernel/taskstats.c:634:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stats, tsk->signal->stats, sizeof(*stats));
^~~~~~
kernel/taskstats.c:634:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stats, tsk->signal->stats, sizeof(*stats));
^~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
crypto/poly1305_generic.c:49:4: warning: Value stored to 'src' is never read [clang-analyzer-deadcode.DeadStores]
src += POLY1305_BLOCK_SIZE;
^
crypto/poly1305_generic.c:49:4: note: Value stored to 'src' is never read
crypto/poly1305_generic.c:80:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
^~~~~~
fs/ecryptfs/crypto.c:126:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:126:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:127:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:127:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:139:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:139:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:168:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:168:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:651:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:651:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:790:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:790:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:969:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:969:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
fs/ecryptfs/crypto.c:1633:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1633:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1767:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1767:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1941:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*encoded_name),
^~~~~~
fs/ecryptfs/crypto.c:1941:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*encoded_name),
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> arch/arm/kernel/signal.c:106:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&kframe, 0, sizeof(kframe));
^~~~~~
arch/arm/kernel/signal.c:106:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&kframe, 0, sizeof(kframe));
^~~~~~
arch/arm/kernel/signal.c:662:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr + offset, sigreturn_codes, sizeof(sigreturn_codes));
^~~~~~
arch/arm/kernel/signal.c:662:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr + offset, sigreturn_codes, sizeof(sigreturn_codes));
^~~~~~
Suppressed 46 warnings (43 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (15 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
arch/arm/kernel/traps.c:92:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, " r%d:%08x", reg, *stack--);
^~~~~~~
arch/arm/kernel/traps.c:92:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, " r%d:%08x", reg, *stack--);
^~~~~~~
arch/arm/kernel/traps.c:135:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(str, ' ', sizeof(str));
^~~~~~
arch/arm/kernel/traps.c:135:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(str, ' ', sizeof(str));
^~~~~~
arch/arm/kernel/traps.c:142:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(str + i * 9, " %08lx", val);
^~~~~~~
arch/arm/kernel/traps.c:142:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(str + i * 9, " %08lx", val);
^~~~~~~
arch/arm/kernel/traps.c:144:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(str + i * 9, " ????????");
^~~~~~~
arch/arm/kernel/traps.c:144:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(str + i * 9, " ????????");
^~~~~~~
arch/arm/kernel/traps.c:183:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, i == 0 ? "(%0*x) " : "%0*x ",
^~~~~~~
arch/arm/kernel/traps.c:183:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, i == 0 ? "(%0*x) " : "%0*x ",
^~~~~~~
arch/arm/kernel/traps.c:186:4: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p += sprintf(p, "bad PC value");
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/traps.c:186:4: note: Value stored to 'p' is never read
p += sprintf(p, "bad PC value");
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/traps.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "bad PC value");
^~~~~~~
arch/arm/kernel/traps.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "bad PC value");
^~~~~~~
>> arch/arm/kernel/traps.c:777:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vectors + 0x1000 - kuser_sz, __kuser_helper_start, kuser_sz);
^~~~~~
arch/arm/kernel/traps.c:777:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vectors + 0x1000 - kuser_sz, __kuser_helper_start, kuser_sz);
^~~~~~
arch/arm/kernel/traps.c:784:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vectors + 0xfe0, vectors + 0xfe8, 4);
^~~~~~
arch/arm/kernel/traps.c:784:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vectors + 0xfe0, vectors + 0xfe8, 4);
^~~~~~
arch/arm/kernel/traps.c:816:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)vectors, __vectors_start, __vectors_end - __vectors_start);
^~~~~~
arch/arm/kernel/traps.c:816:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)vectors, __vectors_start, __vectors_end - __vectors_start);
^~~~~~
arch/arm/kernel/traps.c:817:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)vectors + 0x1000, __stubs_start, __stubs_end - __stubs_start);
^~~~~~
arch/arm/kernel/traps.c:817:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)vectors + 0x1000, __stubs_start, __stubs_end - __stubs_start);
^~~~~~
Suppressed 42 warnings (35 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> arch/arm/probes/kprobes/opt-arm.c:237:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(code, (unsigned long *)optprobe_template_entry,
^~~~~~
arch/arm/probes/kprobes/opt-arm.c:237:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(code, (unsigned long *)optprobe_template_entry,
^~~~~~
arch/arm/probes/kprobes/opt-arm.c:303:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(op->optinsn.copied_insn, op->kp.addr,
^~~~~~
arch/arm/probes/kprobes/opt-arm.c:303:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(op->optinsn.copied_insn, op->kp.addr,
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
>> arch/arm/net/bpf_jit_32.c:1920:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctx, 0, sizeof(ctx));
^~~~~~
arch/arm/net/bpf_jit_32.c:1920:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctx, 0, sizeof(ctx));
^~~~~~
Suppressed 77 warnings (76 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
crypto/algapi.c:238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(larval->alg.cra_driver_name, alg->cra_driver_name,
^~~~~~
crypto/algapi.c:238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(larval->alg.cra_driver_name, alg->cra_driver_name,
^~~~~~
crypto/algapi.c:878:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", name,
^~~~~~~~
crypto/algapi.c:878:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", name,
^~~~~~~~
crypto/algapi.c:882:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
^~~~~~~~
crypto/algapi.c:882:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
^~~~~~~~
crypto/algapi.c:1058:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&alg->stats, 0, sizeof(alg->stats));
^~~~~~
crypto/algapi.c:1058:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&alg->stats, 0, sizeof(alg->stats));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/qnx6/inode.c:512:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ei->di_block_ptr, p->ptr, sizeof(p->ptr));
^~~~~~
fs/qnx6/inode.c:512:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ei->di_block_ptr, p->ptr, sizeof(p->ptr));
^~~~~~
fs/qnx6/inode.c:573:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ei->di_block_ptr, &raw_inode->di_block_ptr,
^~~~~~
fs/qnx6/inode.c:573:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ei->di_block_ptr, &raw_inode->di_block_ptr,
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/qnx6/super_mmi.c:31:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&qsb->Inode, &sb->Inode, sizeof(sb->Inode));
^~~~~~
fs/qnx6/super_mmi.c:31:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&qsb->Inode, &sb->Inode, sizeof(sb->Inode));
^~~~~~
fs/qnx6/super_mmi.c:32:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&qsb->Bitmap, &sb->Bitmap, sizeof(sb->Bitmap));
^~~~~~
fs/qnx6/super_mmi.c:32:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&qsb->Bitmap, &sb->Bitmap, sizeof(sb->Bitmap));
^~~~~~
fs/qnx6/super_mmi.c:33:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&qsb->Longfile, &sb->Longfile, sizeof(sb->Longfile));
^~~~~~
fs/qnx6/super_mmi.c:33:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&qsb->Longfile, &sb->Longfile, sizeof(sb->Longfile));
^~~~~~
fs/qnx6/super_mmi.c:116:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bh1->b_data, qsb, sizeof(struct qnx6_super_block));
^~~~~~
fs/qnx6/super_mmi.c:116:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bh1->b_data, qsb, sizeof(struct qnx6_super_block));
--
34 warnings generated.
fs/nsfs.c:226:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
res = snprintf(buf, size, "%s:[%u]", name, ns->inum);
^~~~~~~~
fs/nsfs.c:226:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
res = snprintf(buf, size, "%s:[%u]", name, ns->inum);
^~~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
fs/fs_context.c:566:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->legacy_data + size, param->key, len);
^~~~~~
fs/fs_context.c:566:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->legacy_data + size, param->key, len);
^~~~~~
fs/fs_context.c:570:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->legacy_data + size, param->string, param->size);
^~~~~~
fs/fs_context.c:570:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->legacy_data + size, param->string, param->size);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
crypto/asymmetric_keys/x509_cert_parser.c:404:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer,
^~~~~~
crypto/asymmetric_keys/x509_cert_parser.c:404:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer,
^~~~~~
crypto/asymmetric_keys/x509_cert_parser.c:408:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + ctx->o_size + 2,
^~~~~~
crypto/asymmetric_keys/x509_cert_parser.c:408:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + ctx->o_size + 2,
^~~~~~
crypto/asymmetric_keys/x509_cert_parser.c:428:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, name, namesize);
^~~~~~
crypto/asymmetric_keys/x509_cert_parser.c:428:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, name, namesize);
^~~~~~
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
crypto/asymmetric_keys/x509_public_key.c:214:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p = memcpy(desc, cert->subject, sulen);
^~~~~~
crypto/asymmetric_keys/x509_public_key.c:214:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
p = memcpy(desc, cert->subject, sulen);
^~~~~~
Suppressed 28 warnings (28 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> fs/sysv/ialloc.c:130:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(raw_inode, 0, sizeof(struct sysv_inode));
^~~~~~
fs/sysv/ialloc.c:130:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(raw_inode, 0, sizeof(struct sysv_inode));
^~~~~~
fs/sysv/ialloc.c:170:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(SYSV_I(inode)->i_data, 0, sizeof(SYSV_I(inode)->i_data));
^~~~~~
fs/sysv/ialloc.c:170:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(SYSV_I(inode)->i_data, 0, sizeof(SYSV_I(inode)->i_data));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
3 warnings generated.
arch/arm/kernel/early_printk.c:20:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, s, l);
^~~~~~
arch/arm/kernel/early_printk.c:20:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, s, l);
^~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> arch/arm/mm/dma-mapping.c:251:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, PAGE_SIZE);
^~~~~~
arch/arm/mm/dma-mapping.c:251:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, PAGE_SIZE);
^~~~~~
arch/arm/mm/dma-mapping.c:262:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, size);
^~~~~~
arch/arm/mm/dma-mapping.c:262:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, size);
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
kernel/time/ntp.c:293:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
return div64_long(offset64 << (NTP_SCALE_SHIFT - SHIFT_FLL), secs);
^
kernel/time/ntp.c:767:6: note: Assuming the condition is false
if (txc->modes & ADJ_ADJTIME) {
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:767:2: note: Taking false branch
if (txc->modes & ADJ_ADJTIME) {
^
kernel/time/ntp.c:781:7: note: Assuming field 'modes' is not equal to 0
if (txc->modes) {
^~~~~~~~~~
kernel/time/ntp.c:781:3: note: Taking true branch
if (txc->modes) {
^
kernel/time/ntp.c:788:4: note: Calling 'process_adjtimex_modes'
process_adjtimex_modes(txc, time_tai);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:712:6: note: Assuming the condition is false
if (txc->modes & ADJ_STATUS)
^~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:712:2: note: Taking false branch
if (txc->modes & ADJ_STATUS)
^
kernel/time/ntp.c:715:6: note: Assuming the condition is false
if (txc->modes & ADJ_NANO)
^~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:715:2: note: Taking false branch
if (txc->modes & ADJ_NANO)
^
kernel/time/ntp.c:718:6: note: Assuming the condition is false
if (txc->modes & ADJ_MICRO)
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:718:2: note: Taking false branch
if (txc->modes & ADJ_MICRO)
^
kernel/time/ntp.c:721:6: note: Assuming the condition is false
if (txc->modes & ADJ_FREQUENCY) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:721:2: note: Taking false branch
if (txc->modes & ADJ_FREQUENCY) {
^
kernel/time/ntp.c:729:6: note: Assuming the condition is false
if (txc->modes & ADJ_MAXERROR)
^~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:729:2: note: Taking false branch
if (txc->modes & ADJ_MAXERROR)
^
kernel/time/ntp.c:732:6: note: Assuming the condition is false
if (txc->modes & ADJ_ESTERROR)
^~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:732:2: note: Taking false branch
if (txc->modes & ADJ_ESTERROR)
^
kernel/time/ntp.c:735:6: note: Assuming the condition is false
if (txc->modes & ADJ_TIMECONST) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:735:2: note: Taking false branch
if (txc->modes & ADJ_TIMECONST) {
^
kernel/time/ntp.c:743:6: note: Assuming the condition is false
if (txc->modes & ADJ_TAI &&
^~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:743:27: note: Left side of '&&' is false
if (txc->modes & ADJ_TAI &&
^
kernel/time/ntp.c:747:6: note: Assuming the condition is true
if (txc->modes & ADJ_OFFSET)
^~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:747:2: note: Taking true branch
if (txc->modes & ADJ_OFFSET)
^
kernel/time/ntp.c:748:3: note: Calling 'ntp_update_offset'
ntp_update_offset(txc->offset);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:302:6: note: Assuming the condition is false
if (!(time_status & STA_PLL))
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/ntp.c:302:2: note: Taking false branch
if (!(time_status & STA_PLL))
^
kernel/time/ntp.c:305:6: note: Assuming the condition is false
if (!(time_status & STA_NANO)) {
--
fs/xfs/libxfs/xfs_inode_buf.c:324:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(to->di_pad2, 0, sizeof(to->di_pad2));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/xfs/libxfs/xfs_rmap.c:244:2: warning: 4th function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
xfs_warn(mp,
^
fs/xfs/libxfs/xfs_rmap.c:2682:6: note: Assuming 'error' is 0
if (error)
^~~~~
fs/xfs/libxfs/xfs_rmap.c:2682:2: note: Taking false branch
if (error)
^
fs/xfs/libxfs/xfs_rmap.c:2684:6: note: Assuming 'has_record' is not equal to 0
if (!has_record) {
^~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:2684:2: note: Taking false branch
if (!has_record) {
^
fs/xfs/libxfs/xfs_rmap.c:2689:10: note: Calling 'xfs_rmap_get_rec'
error = xfs_rmap_get_rec(cur, &irec, &has_record);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:209:6: note: Assuming 'error' is 0
if (error || !*stat)
^~~~~
fs/xfs/libxfs/xfs_rmap.c:209:6: note: Left side of '||' is false
fs/xfs/libxfs/xfs_rmap.c:209:15: note: Assuming the condition is false
if (error || !*stat)
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:209:2: note: Taking false branch
if (error || !*stat)
^
fs/xfs/libxfs/xfs_rmap.c:212:6: note: Calling 'xfs_rmap_btrec_to_irec'
if (xfs_rmap_btrec_to_irec(rec, irec))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:190:9: note: Calling 'xfs_rmap_irec_offset_unpack'
return xfs_rmap_irec_offset_unpack(be64_to_cpu(rec->rmap.rm_offset),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.h:70:6: note: Assuming the condition is true
if (offset & ~(XFS_RMAP_OFF_MASK | XFS_RMAP_OFF_FLAGS))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.h:70:2: note: Taking true branch
if (offset & ~(XFS_RMAP_OFF_MASK | XFS_RMAP_OFF_FLAGS))
^
fs/xfs/libxfs/xfs_rmap.h:71:3: note: Returning without writing to 'irec->rm_flags'
return -EFSCORRUPTED;
^
fs/xfs/libxfs/xfs_rmap.h:71:3: note: Returning the value -117, which participates in a condition later
return -EFSCORRUPTED;
^~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:190:9: note: Returning from 'xfs_rmap_irec_offset_unpack'
return xfs_rmap_irec_offset_unpack(be64_to_cpu(rec->rmap.rm_offset),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:190:2: note: Returning without writing to 'irec->rm_flags'
return xfs_rmap_irec_offset_unpack(be64_to_cpu(rec->rmap.rm_offset),
^
fs/xfs/libxfs/xfs_rmap.c:190:2: note: Returning the value -117, which participates in a condition later
return xfs_rmap_irec_offset_unpack(be64_to_cpu(rec->rmap.rm_offset),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:212:6: note: Returning from 'xfs_rmap_btrec_to_irec'
if (xfs_rmap_btrec_to_irec(rec, irec))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_rmap.c:212:2: note: Taking true branch
if (xfs_rmap_btrec_to_irec(rec, irec))
^
fs/xfs/libxfs/xfs_rmap.c:213:3: note: Control jumps to line 241
goto out_bad_rec;
^
fs/xfs/libxfs/xfs_rmap.c:244:2: note: 4th function call argument is an uninitialized value
xfs_warn(mp,
^
fs/xfs/libxfs/xfs_rmap.c:2646:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:2646:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:2648:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&high, 0xFF, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:2648:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&high, 0xFF, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:2744:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&high, 0xFF, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_rmap.c:2744:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&high, 0xFF, sizeof(high));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> arch/arm/mm/flush.c:192:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, len);
^~~~~~
arch/arm/mm/flush.c:192:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, len);
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
block/blk-mq-sysfs.c:98:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:98:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:115:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:115:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:126:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
block/blk-mq-sysfs.c:126:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
fs/configfs/file.c:270:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:270:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:276:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
fs/configfs/file.c:276:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
fs/configfs/dir.c:1315:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, dentry->d_name.len + 1, "%s", dentry->d_name.name);
^~~~~~~~
fs/configfs/dir.c:1315:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, dentry->d_name.len + 1, "%s", dentry->d_name.name);
^~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
fs/tracefs/inode.c:65:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, dname, len);
^~~~~~
fs/tracefs/inode.c:65:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, dname, len);
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
ipc/msgutil.c:128:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + 1, src + 1, alen);
^~~~~~
ipc/msgutil.c:128:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst + 1, src + 1, alen);
^~~~~~
ipc/msgutil.c:136:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_pseg + 1, src_pseg + 1, alen);
^~~~~~
ipc/msgutil.c:136:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_pseg + 1, src_pseg + 1, alen);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/udf/balloc.c:543:13: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
(etype << 30) | elen, 1);
^
fs/udf/balloc.c:680:6: note: Assuming the condition is false
if (map->s_partition_flags & UDF_PART_FLAG_UNALLOC_BITMAP)
--
kernel/time/clocksource.c:1219:2: note: Taking false branch
if (clocksource_is_watchdog(cs)) {
^
kernel/time/clocksource.c:1226:6: note: Assuming 'cs' is equal to 'curr_clocksource'
if (cs == curr_clocksource) {
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1226:2: note: Taking true branch
if (cs == curr_clocksource) {
^
kernel/time/clocksource.c:1229:7: note: Assuming 'curr_clocksource' is not equal to 'cs'
if (curr_clocksource == cs)
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1229:3: note: Taking false branch
if (curr_clocksource == cs)
^
kernel/time/clocksource.c:1233:6: note: Assuming the condition is true
if (clocksource_is_suspend(cs)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1233:2: note: Taking true branch
if (clocksource_is_suspend(cs)) {
^
kernel/time/clocksource.c:1239:3: note: Calling 'clocksource_suspend_select'
clocksource_suspend_select(true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:713:6: note: 'fallback' is true
if (fallback)
^~~~~~~~
kernel/time/clocksource.c:713:2: note: Taking true branch
if (fallback)
^
kernel/time/clocksource.c:716:22: note: Null pointer value stored to 'cs'
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:7: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:716:2: note: Loop condition is true. Entering loop body
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
kernel/time/clocksource.c:718:7: note: 'fallback' is true
if (fallback && cs == old_suspend)
^~~~~~~~
kernel/time/clocksource.c:718:7: note: Left side of '&&' is true
kernel/time/clocksource.c:718:19: note: Assuming 'cs' is equal to 'old_suspend'
if (fallback && cs == old_suspend)
^~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:718:3: note: Taking true branch
if (fallback && cs == old_suspend)
^
kernel/time/clocksource.c:719:4: note: Execution continues on line 716
continue;
^
kernel/time/clocksource.c:716:2: note: Dereference of null pointer
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:640:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
kernel/time/clocksource.c:1282:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1282:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1300:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1300:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1391:13: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1391:13: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> arch/arm/kernel/atags_proc.c:30:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(atags_copy, tags, sizeof(atags_copy));
^~~~~~
arch/arm/kernel/atags_proc.c:30:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(atags_copy, tags, sizeof(atags_copy));
^~~~~~
arch/arm/kernel/atags_proc.c:62:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->data, atags_copy, size);
^~~~~~
arch/arm/kernel/atags_proc.c:62:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->data, atags_copy, size);
^~~~~~
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/arm/kernel/module.c:375:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(maps, 0, sizeof(maps));
^~~~~~
arch/arm/kernel/module.c:375:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(maps, 0, sizeof(maps));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/orangefs/acl.c:129:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/acl.c:129:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/acl.c:190:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/acl.c:190:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/orangefs/file.c:276:3: warning: Value stored to 'buffer_index' is never read [clang-analyzer-deadcode.DeadStores]
buffer_index = -1;
^ ~~
fs/orangefs/file.c:276:3: note: Value stored to 'buffer_index' is never read
buffer_index = -1;
^ ~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
fs/orangefs/xattr.c:141:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, cx->val, cx->length);
^~~~~~
fs/orangefs/xattr.c:141:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, cx->val, cx->length);
^~~~~~
fs/orangefs/xattr.c:142:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer + cx->length, 0, size - cx->length);
^~~~~~
fs/orangefs/xattr.c:142:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer + cx->length, 0, size - cx->length);
^~~~~~
fs/orangefs/xattr.c:153:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.getxattr.key, name);
^~~~~~
fs/orangefs/xattr.c:153:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.getxattr.key, name);
^~~~~~
fs/orangefs/xattr.c:174:5: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:174:5: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:206:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
^~~~~~
fs/orangefs/xattr.c:206:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
^~~~~~
fs/orangefs/xattr.c:207:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer + length, 0, size - length);
^~~~~~
fs/orangefs/xattr.c:207:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer + length, 0, size - length);
^~~~~~
fs/orangefs/xattr.c:221:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:221:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:222:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:222:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:228:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:228:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:229:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:229:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:268:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.removexattr.key, name);
^~~~~~
fs/orangefs/xattr.c:268:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.removexattr.key, name);
^~~~~~
fs/orangefs/xattr.c:362:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.setxattr.keyval.key, name);
^~~~~~
fs/orangefs/xattr.c:362:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.setxattr.keyval.key, name);
^~~~~~
fs/orangefs/xattr.c:364:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
^~~~~~
fs/orangefs/xattr.c:364:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
^~~~~~
fs/orangefs/xattr.c:430:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, size);
^~~~~~
fs/orangefs/xattr.c:430:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, size);
^~~~~~
fs/orangefs/xattr.c:492:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + total,
^~~~~~
fs/orangefs/xattr.c:492:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + total,
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
kernel/fork.c:1051:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm->rss_stat, 0, sizeof(mm->rss_stat));
^~~~~~
kernel/fork.c:1051:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm->rss_stat, 0, sizeof(mm->rss_stat));
^~~~~~
kernel/fork.c:1102:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mm, 0, sizeof(*mm));
^~~~~~
kernel/fork.c:1102:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mm, 0, sizeof(*mm));
^~~~~~
kernel/fork.c:1446:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mm, oldmm, sizeof(*mm));
^~~~~~
kernel/fork.c:1446:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mm, oldmm, sizeof(*mm));
^~~~~~
kernel/fork.c:1575:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig->action, current->sighand->action, sizeof(sig->action));
^~~~~~
kernel/fork.c:1575:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig->action, current->sighand->action, sizeof(sig->action));
^~~~~~
kernel/fork.c:1643:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig->rlim, current->signal->rlim, sizeof sig->rlim);
^~~~~~
kernel/fork.c:1643:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig->rlim, current->signal->rlim, sizeof sig->rlim);
^~~~~~
kernel/fork.c:2108:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->irqtrace, 0, sizeof(p->irqtrace));
^~~~~~
kernel/fork.c:2108:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->irqtrace, 0, sizeof(p->irqtrace));
^~~~~~
Suppressed 75 warnings (72 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (8 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
>> arch/arm/vfp/vfpmodule.c:109:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vfp, 0, sizeof(union vfp_state));
^~~~~~
arch/arm/vfp/vfpmodule.c:109:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vfp, 0, sizeof(union vfp_state));
^~~~~~
>> arch/arm/vfp/vfpmodule.c:561:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufp->fpregs, &hwstate->fpregs, sizeof(hwstate->fpregs));
^~~~~~
arch/arm/vfp/vfpmodule.c:561:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufp->fpregs, &hwstate->fpregs, sizeof(hwstate->fpregs));
^~~~~~
arch/arm/vfp/vfpmodule.c:600:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hwstate->fpregs, &ufp->fpregs, sizeof(hwstate->fpregs));
^~~~~~
arch/arm/vfp/vfpmodule.c:600:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hwstate->fpregs, &ufp->fpregs, sizeof(hwstate->fpregs));
^~~~~~
Suppressed 22 warnings (21 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
>> arch/arm/kernel/process.c:185:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), " Table: %08x DAC: %08x",
^~~~~~~~
arch/arm/kernel/process.c:185:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), " Table: %08x DAC: %08x",
^~~~~~~~
arch/arm/kernel/process.c:221:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(thread->used_cp, 0, sizeof(thread->used_cp));
^~~~~~
arch/arm/kernel/process.c:221:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(thread->used_cp, 0, sizeof(thread->used_cp));
^~~~~~
arch/arm/kernel/process.c:222:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tsk->thread.debug, 0, sizeof(struct debug_info));
^~~~~~
arch/arm/kernel/process.c:222:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tsk->thread.debug, 0, sizeof(struct debug_info));
^~~~~~
arch/arm/kernel/process.c:223:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&thread->fpstate, 0, sizeof(union fp_state));
^~~~~~
arch/arm/kernel/process.c:223:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&thread->fpstate, 0, sizeof(union fp_state));
^~~~~~
arch/arm/kernel/process.c:242:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&thread->cpu_context, 0, sizeof(struct cpu_context_save));
^~~~~~
arch/arm/kernel/process.c:242:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&thread->cpu_context, 0, sizeof(struct cpu_context_save));
^~~~~~
arch/arm/kernel/process.c:260:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
arch/arm/kernel/process.c:260:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
fs/proc/proc_net.c:367:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(netd->name, "net", 4);
^~~~~~
fs/proc/proc_net.c:367:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(netd->name, "net", 4);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
>> fs/proc/vmcore.c:154:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, nr_bytes);
^~~~~~
fs/proc/vmcore.c:154:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, nr_bytes);
^~~~~~
>> fs/proc/vmcore.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target, src, size);
^~~~~~
fs/proc/vmcore.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target, src, size);
^~~~~~
fs/proc/vmcore.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
>> fs/proc/vmcore.c:907:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf64_Ehdr)-sizeof(Elf64_Phdr)));
^~~~~~~
fs/proc/vmcore.c:907:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf64_Ehdr)-sizeof(Elf64_Phdr)));
^~~~~~~
fs/proc/vmcore.c:908:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:908:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:1092:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:1092:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:1098:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf32_Ehdr)-sizeof(Elf32_Phdr)));
^~~~~~~
fs/proc/vmcore.c:1098:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf32_Ehdr)-sizeof(Elf32_Phdr)));
^~~~~~~
fs/proc/vmcore.c:1099:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:1099:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(elfptr + *elfsz, 0, i);
^~~~~~
>> fs/proc/vmcore.c:1390:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy((char *)vdd_hdr->name, VMCOREDD_NOTE_NAME,
^~~~~~~
fs/proc/vmcore.c:1390:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy((char *)vdd_hdr->name, VMCOREDD_NOTE_NAME,
^~~~~~~
fs/proc/vmcore.c:1392:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vdd_hdr->dump_name, data->dump_name, sizeof(vdd_hdr->dump_name));
^~~~~~
fs/proc/vmcore.c:1392:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vdd_hdr->dump_name, data->dump_name, sizeof(vdd_hdr->dump_name));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
crypto/asymmetric_keys/pkcs8_parser.c:103:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctx, 0, sizeof(ctx));
^~~~~~
crypto/asymmetric_keys/pkcs8_parser.c:103:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctx, 0, sizeof(ctx));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
crypto/asymmetric_keys/pkcs7_verify.c:101:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sig->digest, 0, sig->digest_size);
^~~~~~
crypto/asymmetric_keys/pkcs7_verify.c:101:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sig->digest, 0, sig->digest_size);
^~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
block/disk-events.c:347:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:347:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:352:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:352:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:379:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:379:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:380:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:380:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:390:17: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
block/disk-events.c:390:17: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
Suppressed 28 warnings (28 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
fs/autofs/root.c:562:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(cp, symname);
^~~~~~
fs/autofs/root.c:562:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cp, symname);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/autofs/waitq.c:95:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pkt, 0, sizeof(pkt)); /* For security reasons */
^~~~~~
fs/autofs/waitq.c:95:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pkt, 0, sizeof(pkt)); /* For security reasons */
^~~~~~
fs/autofs/waitq.c:110:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mp->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:110:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mp->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:123:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ep->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:123:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ep->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:143:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(packet->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:143:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(packet->name, wq->name.name, wq->name.len);
^~~~~~
fs/autofs/waitq.c:350:14: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
qstr.len = sprintf(name, "%p", dentry);
^~~~~~~
fs/autofs/waitq.c:350:14: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
qstr.len = sprintf(name, "%p", dentry);
^~~~~~~
fs/autofs/waitq.c:391:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&wq->name, &qstr, sizeof(struct qstr));
^~~~~~
fs/autofs/waitq.c:391:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&wq->name, &qstr, sizeof(struct qstr));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
kernel/cgroup/cgroup-v1.c:1101:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(root->release_agent_path, ctx->release_agent);
^~~~~~
kernel/cgroup/cgroup-v1.c:1101:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(root->release_agent_path, ctx->release_agent);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> kernel/cgroup/debug.c:225:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pbuf, sizeof(pbuf) - 1, " P=%d",
^~~~~~~~
kernel/cgroup/debug.c:225:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(pbuf, sizeof(pbuf) - 1, " P=%d",
^~~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
kernel/kmod.c:142:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = vsnprintf(module_name, MODULE_NAME_LEN, fmt, args);
^~~~~~~~~
kernel/kmod.c:142:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
ret = vsnprintf(module_name, MODULE_NAME_LEN, fmt, args);
^~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
103 warnings generated.
kernel/sched/core.c:4250:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->stats, 0, sizeof(p->stats));
^~~~~~
kernel/sched/core.c:4250:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->stats, 0, sizeof(p->stats));
^~~~~~
kernel/sched/core.c:4429:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->sched_info, 0, sizeof(p->sched_info));
^~~~~~
kernel/sched/core.c:4429:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->sched_info, 0, sizeof(p->sched_info));
^~~~~~
kernel/sched/core.c:5510:16: warning: Value stored to 'preempt_disable_ip' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:5510:16: note: Value stored to 'preempt_disable_ip' during its initialization is never read
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: warning: Value stored to 'rq' is never read [clang-analyzer-deadcode.DeadStores]
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: note: Value stored to 'rq' is never read
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:7651:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:7651:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:9329:3: warning: Value stored to 'ptr' is never read [clang-analyzer-deadcode.DeadStores]
ptr += nr_cpu_ids * sizeof(void **);
^
kernel/sched/core.c:9329:3: note: Value stored to 'ptr' is never read
kernel/sched/core.c:10759:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10759:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10764:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(tok, "%llu", quotap))
^~~~~~
kernel/sched/core.c:10764:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(tok, "%llu", quotap))
^~~~~~
Suppressed 95 warnings (89 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
fs/configfs/symlink.c:51:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + length, config_item_name(p), cur);
^~~~~~
fs/configfs/symlink.c:51:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + length, config_item_name(p), cur);
^~~~~~
fs/configfs/symlink.c:70:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(s,"../");
^~~~~~
fs/configfs/symlink.c:70:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(s,"../");
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
fs/configfs/item.c:60:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
need = vsnprintf(item->ci_namebuf, limit, fmt, args);
^~~~~~~~~
fs/configfs/item.c:60:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
need = vsnprintf(item->ci_namebuf, limit, fmt, args);
^~~~~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
fs/devpts/inode.c:584:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
^
fs/userfaultfd.c:1103:2: note: Loop condition is false. Exiting loop
__set_current_state(TASK_RUNNING);
^
include/linux/sched.h:205:3: note: expanded from macro '__set_current_state'
WRITE_ONCE(current->__state, (state_value)); \
^
include/asm-generic/rwonce.h:61:2: note: expanded from macro 'WRITE_ONCE'
__WRITE_ONCE(x, val); \
^
include/asm-generic/rwonce.h:53:35: note: expanded from macro '__WRITE_ONCE'
#define __WRITE_ONCE(x, val) \
^
fs/userfaultfd.c:1103:2: note: Loop condition is false. Exiting loop
__set_current_state(TASK_RUNNING);
^
include/linux/sched.h:205:3: note: expanded from macro '__set_current_state'
WRITE_ONCE(current->__state, (state_value)); \
^
include/asm-generic/rwonce.h:58:33: note: expanded from macro 'WRITE_ONCE'
#define WRITE_ONCE(x, val) \
^
fs/userfaultfd.c:1103:2: note: Loop condition is false. Exiting loop
__set_current_state(TASK_RUNNING);
^
include/linux/sched.h:203:2: note: expanded from macro '__set_current_state'
do { \
^
fs/userfaultfd.c:1106:7: note: 'ret' is 0
if (!ret && msg->event == UFFD_EVENT_FORK) {
^~~
fs/userfaultfd.c:1106:6: note: Left side of '&&' is true
if (!ret && msg->event == UFFD_EVENT_FORK) {
^
fs/userfaultfd.c:1106:14: note: Assuming field 'event' is equal to UFFD_EVENT_FORK
if (!ret && msg->event == UFFD_EVENT_FORK) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/userfaultfd.c:1106:2: note: Taking true branch
if (!ret && msg->event == UFFD_EVENT_FORK) {
^
fs/userfaultfd.c:1107:32: note: Passing null pointer value via 1st parameter 'new'
ret = resolve_userfault_fork(fork_nctx, inode, msg);
^~~~~~~~~
fs/userfaultfd.c:1107:9: note: Calling 'resolve_userfault_fork'
ret = resolve_userfault_fork(fork_nctx, inode, msg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/userfaultfd.c:986:14: note: Access to field 'flags' results in a dereference of a null pointer (loaded from variable 'new')
O_RDWR | (new->flags & UFFD_SHARED_FCNTL_FLAGS), inode);
^~~
fs/userfaultfd.c:1969:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&uffdio_api, 0, sizeof(uffdio_api));
^~~~~~
fs/userfaultfd.c:1969:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&uffdio_api, 0, sizeof(uffdio_api));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/xfs/libxfs/xfs_refcount.c:114:19: warning: Value stored to 'agno' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
xfs_agnumber_t agno = cur->bc_ag.pag->pag_agno;
^~~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_refcount.c:114:19: note: Value stored to 'agno' during its initialization is never read
xfs_agnumber_t agno = cur->bc_ag.pag->pag_agno;
^~~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_refcount.c:1715:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1715:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1716:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&high, 0, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1716:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&high, 0, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1777:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1777:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&low, 0, sizeof(low));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1779:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&high, 0xFF, sizeof(high));
^~~~~~
fs/xfs/libxfs/xfs_refcount.c:1779:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&high, 0xFF, sizeof(high));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
crypto/seqiv.c:33:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
crypto/seqiv.c:33:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> fs/sysv/balloc.c:84:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/sysv/balloc.c:84:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
>> fs/sysv/balloc.c:86:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(get_chunk(sb,bh), blocks, count * sizeof(sysv_zone_t));
^~~~~~
fs/sysv/balloc.c:86:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(get_chunk(sb,bh), blocks, count * sizeof(sysv_zone_t));
^~~~~~
fs/sysv/balloc.c:144:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sbi->s_bcache, get_chunk(sb, bh),
^~~~~~
fs/sysv/balloc.c:144:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sbi->s_bcache, get_chunk(sb, bh),
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> fs/sysv/itree.c:149:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, blocksize);
^~~~~~
fs/sysv/itree.c:149:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, blocksize);
^~~~~~
Suppressed 43 warnings (42 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
security/commoncap.c:441:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:441:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:472:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:472:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:582:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:582:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:660:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));
^~~~~~
security/commoncap.c:660:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));
^~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (28 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
97 warnings generated.
kernel/bpf/core.c:237:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fp, fp_old, fp_old->pages * PAGE_SIZE);
^~~~~~
kernel/bpf/core.c:237:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fp, fp_old, fp_old->pages * PAGE_SIZE);
^~~~~~
kernel/bpf/core.c:284:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ws, 0, sizeof(ws));
^~~~~~
kernel/bpf/core.c:284:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ws, 0, sizeof(ws));
^~~~~~
kernel/bpf/core.c:311:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&raw[psize], 0, raw_size - psize);
^~~~~~
kernel/bpf/core.c:311:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&raw[psize], 0, raw_size - psize);
^~~~~~
kernel/bpf/core.c:333:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fp->tag, result, sizeof(fp->tag));
^~~~~~
kernel/bpf/core.c:333:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fp->tag, result, sizeof(fp->tag));
^~~~~~
kernel/bpf/core.c:452:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prog->insnsi + off, patch, sizeof(*patch));
^~~~~~
kernel/bpf/core.c:452:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prog->insnsi + off, patch, sizeof(*patch));
^~~~~~
kernel/bpf/core.c:488:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(prog_adj->insnsi + off + len, prog_adj->insnsi + off + 1,
^~~~~~~
kernel/bpf/core.c:488:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(prog_adj->insnsi + off + len, prog_adj->insnsi + off + 1,
^~~~~~~
kernel/bpf/core.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len);
^~~~~~
kernel/bpf/core.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len);
^~~~~~
kernel/bpf/core.c:508:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(prog->insnsi + off, prog->insnsi + off + cnt,
^~~~~~~
kernel/bpf/core.c:508:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(prog->insnsi + off, prog->insnsi + off + cnt,
--
ipc/sem.c:1665:2: note: Control jumps to 'case 17:' at line 1683
switch (cmd) {
^
ipc/sem.c:1684:10: note: Calling 'semctl_main'
return semctl_main(ns, semid, semnum, cmd, p);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1418:6: note: Calling 'IS_ERR'
if (IS_ERR(sma)) {
^~~~~~~~~~~
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1418:6: note: Returning from 'IS_ERR'
if (IS_ERR(sma)) {
^~~~~~~~~~~
ipc/sem.c:1418:2: note: Taking false branch
if (IS_ERR(sma)) {
^
ipc/sem.c:1426:35: note: 'cmd' is equal to SETALL
if (ipcperms(ns, &sma->sem_perm, cmd == SETALL ? S_IWUGO : S_IRUGO))
^~~
ipc/sem.c:1426:35: note: '?' condition is true
ipc/sem.c:1426:6: note: Assuming the condition is false
if (ipcperms(ns, &sma->sem_perm, cmd == SETALL ? S_IWUGO : S_IRUGO))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1426:2: note: Taking false branch
if (ipcperms(ns, &sma->sem_perm, cmd == SETALL ? S_IWUGO : S_IRUGO))
^
ipc/sem.c:1429:8: note: Calling 'security_sem_semctl'
err = security_sem_semctl(&sma->sem_perm, cmd);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/security.h:1278:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
ipc/sem.c:1429:8: note: Returning from 'security_sem_semctl'
err = security_sem_semctl(&sma->sem_perm, cmd);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1430:6: note: 'err' is 0
if (err)
^~~
ipc/sem.c:1430:2: note: Taking false branch
if (err)
^
ipc/sem.c:1434:2: note: Control jumps to 'case 17:' at line 1475
switch (cmd) {
^
ipc/sem.c:1480:7: note: Assuming the condition is false
if (!ipc_rcu_getref(&sma->sem_perm)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1480:3: note: Taking false branch
if (!ipc_rcu_getref(&sma->sem_perm)) {
^
ipc/sem.c:1486:7: note: Assuming 'nsems' is <= SEMMSL_FAST
if (nsems > SEMMSL_FAST) {
^~~~~~~~~~~~~~~~~~~
ipc/sem.c:1486:3: note: Taking false branch
if (nsems > SEMMSL_FAST) {
^
ipc/sem.c:1495:7: note: Calling 'copy_from_user'
if (copy_from_user(sem_io, p, nsems*sizeof(ushort))) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:6: note: Assuming the condition is true
if (likely(check_copy_size(to, n, false)))
^
include/linux/compiler.h:77:38: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^~~~
include/linux/uaccess.h:191:2: note: Taking false branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:193:2: note: Returning without writing to '*to'
return n;
^
include/linux/uaccess.h:193:2: note: Returning value (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
ipc/sem.c:1495:7: note: Returning from 'copy_from_user'
if (copy_from_user(sem_io, p, nsems*sizeof(ushort))) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1495:7: note: Assuming the condition is false
if (copy_from_user(sem_io, p, nsems*sizeof(ushort))) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/sem.c:1495:3: note: Taking false branch
if (copy_from_user(sem_io, p, nsems*sizeof(ushort))) {
^
ipc/sem.c:1501:8: note: The value 0 is assigned to 'i'
for (i = 0; i < nsems; i++) {
^~~~~
ipc/sem.c:1501:15: note: Assuming 'i' is < 'nsems'
for (i = 0; i < nsems; i++) {
^~~~~~~~~
ipc/sem.c:1501:3: note: Loop condition is true. Entering loop body
for (i = 0; i < nsems; i++) {
^
ipc/sem.c:1502:18: note: The left operand of '>' is a garbage value
if (sem_io[i] > SEMVMX) {
~~~~~~~~~ ^
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/sysv/dir.c:215:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy (de->name, name, namelen);
^~~~~~
fs/sysv/dir.c:215:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy (de->name, name, namelen);
^~~~~~
>> fs/sysv/dir.c:216:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (de->name + namelen, 0, SYSV_DIRSIZE - namelen - 2);
^~~~~~
fs/sysv/dir.c:216:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (de->name + namelen, 0, SYSV_DIRSIZE - namelen - 2);
^~~~~~
fs/sysv/dir.c:265:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(base, 0, PAGE_SIZE);
^~~~~~
fs/sysv/dir.c:265:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(base, 0, PAGE_SIZE);
^~~~~~
fs/sysv/dir.c:339:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = dir_commit_chunk(page, pos, SYSV_DIRSIZE);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/sysv/dir.c:339:2: note: Value stored to 'err' is never read
err = dir_commit_chunk(page, pos, SYSV_DIRSIZE);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
lib/xxhash.c:81:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, sizeof(*dst));
^~~~~~
lib/xxhash.c:81:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, sizeof(*dst));
^~~~~~
lib/xxhash.c:87:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, sizeof(*dst));
^~~~~~
lib/xxhash.c:87:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, sizeof(*dst));
^~~~~~
lib/xxhash.c:247:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state, 0, sizeof(state));
^~~~~~
lib/xxhash.c:247:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state, 0, sizeof(state));
^~~~~~
lib/xxhash.c:252:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(statePtr, &state, sizeof(state));
^~~~~~
lib/xxhash.c:252:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(statePtr, &state, sizeof(state));
^~~~~~
lib/xxhash.c:261:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state, 0, sizeof(state));
^~~~~~
lib/xxhash.c:261:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state, 0, sizeof(state));
^~~~~~
lib/xxhash.c:266:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(statePtr, &state, sizeof(state));
^~~~~~
lib/xxhash.c:266:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(statePtr, &state, sizeof(state));
^~~~~~
lib/xxhash.c:282:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((uint8_t *)(state->mem32) + state->memsize, input, len);
^~~~~~
lib/xxhash.c:282:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((uint8_t *)(state->mem32) + state->memsize, input, len);
^~~~~~
lib/xxhash.c:290:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((uint8_t *)(state->mem32) + state->memsize, input,
^~~~~~
lib/xxhash.c:290:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((uint8_t *)(state->mem32) + state->memsize, input,
^~~~~~
lib/xxhash.c:331:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->mem32, p, (size_t)(b_end-p));
^~~~~~
lib/xxhash.c:331:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->mem32, p, (size_t)(b_end-p));
^~~~~~
lib/xxhash.c:388:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((uint8_t *)state->mem64) + state->memsize, input, len);
^~~~~~
lib/xxhash.c:388:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((uint8_t *)state->mem64) + state->memsize, input, len);
^~~~~~
lib/xxhash.c:396:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((uint8_t *)p64) + state->memsize, input,
^~~~~~
lib/xxhash.c:396:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((uint8_t *)p64) + state->memsize, input,
^~~~~~
lib/xxhash.c:436:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->mem64, p, (size_t)(b_end-p));
^~~~~~
lib/xxhash.c:436:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->mem64, p, (size_t)(b_end-p));
^~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/ecryptfs/debug.c:37:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig, auth_tok->token.password.signature,
--
^~~~~~
fs/ecryptfs/miscdev.c:417:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&counter_nbo, &data[PKT_CTR_OFFSET], PKT_CTR_SIZE);
^~~~~~
fs/ecryptfs/miscdev.c:417:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&counter_nbo, &data[PKT_CTR_OFFSET], PKT_CTR_SIZE);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
crypto/echainiv.c:65:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&nseqno, info + ivsize - 8, 8);
^~~~~~
crypto/echainiv.c:65:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&nseqno, info + ivsize - 8, 8);
^~~~~~
crypto/echainiv.c:67:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, ivsize);
^~~~~~
crypto/echainiv.c:67:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, ivsize);
^~~~~~
crypto/echainiv.c:74:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&a, ctx->salt + ivsize - 8, 8);
^~~~~~
crypto/echainiv.c:74:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&a, ctx->salt + ivsize - 8, 8);
^~~~~~
crypto/echainiv.c:79:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(info + ivsize - 8, &a, 8);
^~~~~~
crypto/echainiv.c:79:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(info + ivsize - 8, &a, 8);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
fs/autofs/expire.c:546:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pkt, 0, sizeof(pkt));
^~~~~~
fs/autofs/expire.c:546:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pkt, 0, sizeof(pkt));
^~~~~~
fs/autofs/expire.c:556:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt.name, dentry->d_name.name, pkt.len);
^~~~~~
fs/autofs/expire.c:556:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt.name, dentry->d_name.name, pkt.len);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
fs/autofs/dev-ioctl.c:519:34: warning: Although the value stored to 'devid' is used in the enclosing expression, the value is never actually read from 'devid' [clang-analyzer-deadcode.DeadStores]
param->ismountpoint.out.devid = devid = 0;
^ ~
fs/autofs/dev-ioctl.c:519:34: note: Although the value stored to 'devid' is used in the enclosing expression, the value is never actually read from 'devid'
param->ismountpoint.out.devid = devid = 0;
^ ~
Suppressed 28 warnings (28 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/adfs/dir.c:30:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, dir->bhs[index]->b_data + offset, remain);
^~~~~~
fs/adfs/dir.c:30:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, dir->bhs[index]->b_data + offset, remain);
^~~~~~
fs/adfs/dir.c:37:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, dir->bhs[index]->b_data + offset, len);
^~~~~~
fs/adfs/dir.c:37:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, dir->bhs[index]->b_data + offset, len);
^~~~~~
fs/adfs/dir.c:55:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dir->bhs[index]->b_data + offset, src, remain);
^~~~~~
fs/adfs/dir.c:55:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dir->bhs[index]->b_data + offset, src, remain);
^~~~~~
fs/adfs/dir.c:62:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dir->bhs[index]->b_data + offset, src, len);
^~~~~~
fs/adfs/dir.c:62:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dir->bhs[index]->b_data + offset, src, len);
^~~~~~
fs/adfs/dir.c:115:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bhs, dir->bhs, dir->nr_buffers * sizeof(*bhs));
^~~~~~
fs/adfs/dir.c:115:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bhs, dir->bhs, dir->nr_buffers * sizeof(*bhs));
^~~~~~
fs/adfs/dir.c:277:29: warning: Value stored to 'ops' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const struct adfs_dir_ops *ops = ADFS_SB(sb)->s_dir;
^~~ ~~~~~~~~~~~~~~~~~~
fs/adfs/dir.c:277:29: note: Value stored to 'ops' during its initialization is never read
const struct adfs_dir_ops *ops = ADFS_SB(sb)->s_dir;
^~~ ~~~~~~~~~~~~~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> arch/arm/kernel/ptrace.c:626:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return membuf_store(&to, vfp->fpscr);
^
include/linux/regset.h:70:4: note: expanded from macro 'membuf_store'
memcpy(__s->p, &__v, __size); \
^~~~~~
arch/arm/kernel/ptrace.c:626:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
return membuf_store(&to, vfp->fpscr);
^
include/linux/regset.h:70:4: note: expanded from macro 'membuf_store'
memcpy(__s->p, &__v, __size); \
^~~~~~
Suppressed 50 warnings (48 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
mm/mincore.c:110:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vec, 1, nr);
^~~~~~
mm/mincore.c:110:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vec, 1, nr);
^~~~~~
mm/mincore.c:197:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vec, 1, pages);
^~~~~~
mm/mincore.c:197:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vec, 1, pages);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
mm/mmap.c:1984:2: warning: Value stored to 'gap_end' is never read [clang-analyzer-deadcode.DeadStores]
gap_end = ULONG_MAX; /* Only for VM_BUG_ON below */
^
mm/mmap.c:1984:2: note: Value stored to 'gap_end' is never read
mm/mmap.c:3251:3: warning: Value stored to 'faulted_in_anon_vma' is never read [clang-analyzer-deadcode.DeadStores]
faulted_in_anon_vma = false;
^ ~~~~~
mm/mmap.c:3251:3: note: Value stored to 'faulted_in_anon_vma' is never read
faulted_in_anon_vma = false;
^ ~~~~~
mm/mmap.c:3693:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = percpu_counter_init(&vm_committed_as, 0, GFP_KERNEL);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/mmap.c:3693:2: note: Value stored to 'ret' is never read
ret = percpu_counter_init(&vm_committed_as, 0, GFP_KERNEL);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
mm/mmu_gather.c:86:3: warning: Value stored to 'batch' is never read [clang-analyzer-deadcode.DeadStores]
batch = tlb->active;
^ ~~~~~~~~~~~
mm/mmu_gather.c:86:3: note: Value stored to 'batch' is never read
batch = tlb->active;
^ ~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
mm/slab_common.c:1062:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sinfo, 0, sizeof(sinfo));
^~~~~~
mm/slab_common.c:1062:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sinfo, 0, sizeof(sinfo));
^~~~~~
mm/slab_common.c:1188:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ret, kasan_reset_tag(p), ks);
^~~~~~
mm/slab_common.c:1188:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ret, kasan_reset_tag(p), ks);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
mm/dmapool.c:376:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(retval, 0, pool->size);
^~~~~~
mm/dmapool.c:376:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(retval, 0, pool->size);
^~~~~~
mm/dmapool.c:425:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vaddr, 0, pool->size);
^~~~~~
mm/dmapool.c:425:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
--
^~~~
fs/nls/nls_base.c:227:10: note: Dereference of null pointer
*op++ = (u8) u;
~~~~~~^~~~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/xfs/libxfs/xfs_attr_remote.c:310:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(*dst, src + hdr_size, byte_cnt);
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:310:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(*dst, src + hdr_size, byte_cnt);
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:349:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + hdr_size, *src, byte_cnt);
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:349:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst + hdr_size, *src, byte_cnt);
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:358:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst + hdr_size + byte_cnt, 0,
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:358:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst + hdr_size + byte_cnt, 0,
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:581:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(map, 0, sizeof(struct xfs_bmbt_irec));
^~~~~~
fs/xfs/libxfs/xfs_attr_remote.c:581:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(map, 0, sizeof(struct xfs_bmbt_irec));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/xfs/libxfs/xfs_bmap.c:646:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:646:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:800:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = 0;
^ ~
fs/xfs/libxfs/xfs_bmap.c:800:2: note: Value stored to 'error' is never read
error = 0;
^ ~
fs/xfs/libxfs/xfs_bmap.c:801:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:801:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:960:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dargs, 0, sizeof(dargs));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:960:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dargs, 0, sizeof(dargs));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:3988:3: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = xfs_bmap_extsize_align(mp, got, &prev, extsz, 0, eof,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_bmap.c:3988:3: note: Value stored to 'error' is never read
error = xfs_bmap_extsize_align(mp, got, &prev, extsz, 0, eof,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_bmap.c:5032:2: warning: Value stored to 'qfield' is never read [clang-analyzer-deadcode.DeadStores]
qfield = 0;
^ ~
fs/xfs/libxfs/xfs_bmap.c:5032:2: note: Value stored to 'qfield' is never read
qfield = 0;
^ ~
fs/xfs/libxfs/xfs_bmap.c:5734:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new, got, sizeof(new));
^~~~~~
fs/xfs/libxfs/xfs_bmap.c:5734:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new, got, sizeof(new));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> arch/arm/probes/kprobes/test-core.c:1501:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(expected_memory, mem, expected_memory_size(mem));
^~~~~~
arch/arm/probes/kprobes/test-core.c:1501:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(expected_memory, mem, expected_memory_size(mem));
^~~~~~
Suppressed 37 warnings (34 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
lib/parser.c:340:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, src->from, len);
^~~~~~
lib/parser.c:340:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, src->from, len);
^~~~~~
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
lib/crypto/chacha.c:81:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:81:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:111:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:111:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:112:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[4], &x[12], 16);
^~~~~~
lib/crypto/chacha.c:112:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&stream[4], &x[12], 16);
^~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
crypto/ahash.c:151:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alignbuffer, key, keylen);
^~~~~~
crypto/ahash.c:151:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alignbuffer, key, keylen);
^~~~~~
crypto/ahash.c:261:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->result, req->result,
^~~~~~
crypto/ahash.c:261:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->result, req->result,
^~~~~~
crypto/ahash.c:504:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rhash, 0, sizeof(rhash));
^~~~~~
crypto/ahash.c:504:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rhash, 0, sizeof(rhash));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
crypto/shash.c:57:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alignbuffer, key, keylen);
^~~~~~
crypto/shash.c:57:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alignbuffer, key, keylen);
^~~~~~
crypto/shash.c:113:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, data, unaligned_len);
^~~~~~
crypto/shash.c:113:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, data, unaligned_len);
^~~~~~
crypto/shash.c:115:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, unaligned_len);
^~~~~~
crypto/shash.c:115:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, unaligned_len);
--
^~~~~~~
kernel/module.c:1051:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%i\n", module_refcount(mk->mod));
^~~~~~~
kernel/module.c:1154:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", state);
^~~~~~~
kernel/module.c:1154:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", state);
^~~~~~~
kernel/module.c:1176:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%u\n", mk->mod->core_layout.size);
^~~~~~~
kernel/module.c:1176:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%u\n", mk->mod->core_layout.size);
^~~~~~~
kernel/module.c:1185:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%u\n", mk->mod->init_layout.size);
^~~~~~~
kernel/module.c:1185:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%u\n", mk->mod->init_layout.size);
^~~~~~~
kernel/module.c:1444:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(ownername, module_name(fsa.owner), MODULE_NAME_LEN);
^~~~~~~
kernel/module.c:1444:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(ownername, module_name(fsa.owner), MODULE_NAME_LEN);
^~~~~~~
kernel/module.c:1518:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, bounce, count);
^~~~~~
kernel/module.c:1518:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, bounce, count);
^~~~~~
kernel/module.c:1615:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, bin_attr->private + pos, count);
^~~~~~
kernel/module.c:1615:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, bin_attr->private + pos, count);
^~~~~~
kernel/module.c:1766:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(temp_attr, attr, sizeof(*temp_attr));
^~~~~~
kernel/module.c:1766:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(temp_attr, attr, sizeof(*temp_attr));
^~~~~~
kernel/module.c:1833:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mod->mkobj.kobj, 0, sizeof(mod->mkobj.kobj));
^~~~~~
kernel/module.c:1833:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mod->mkobj.kobj, 0, sizeof(mod->mkobj.kobj));
^~~~~~
kernel/module.c:3438:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, mod->core_layout.size);
^~~~~~
kernel/module.c:3438:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, mod->core_layout.size);
^~~~~~
kernel/module.c:3454:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, mod->init_layout.size);
^~~~~~
kernel/module.c:3454:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, mod->init_layout.size);
^~~~~~
kernel/module.c:3475:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size);
^~~~~~
kernel/module.c:3475:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size);
^~~~~~
kernel/module.c:4344:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(namebuf, ret, KSYM_NAME_LEN - 1);
^~~~~~~
kernel/module.c:4344:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(namebuf, ret, KSYM_NAME_LEN - 1);
^~~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
kernel/user_namespace.c:775:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(forward, map->extent,
^~~~~~
kernel/user_namespace.c:775:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(forward, map->extent,
^~~~~~
kernel/user_namespace.c:947:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&new_map, 0, sizeof(struct uid_gid_map));
^~~~~~
kernel/user_namespace.c:947:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&new_map, 0, sizeof(struct uid_gid_map));
^~~~~~
kernel/user_namespace.c:1066:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(map->extent, new_map.extent,
^~~~~~
kernel/user_namespace.c:1066:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(map->extent, new_map.extent,
^~~~~~
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> kernel/pid_namespace.c:49:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "pid_%u", level + 1);
^~~~~~~~
kernel/pid_namespace.c:49:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "pid_%u", level + 1);
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
82 warnings generated.
kernel/audit.c:946:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, payload, size);
^~~~~~
kernel/audit.c:946:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, payload, size);
^~~~~~
kernel/audit.c:1229:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1229:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1247:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1247:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1249:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s, data, min_t(size_t, sizeof(s), data_len));
^~~~~~
kernel/audit.c:1249:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s, data, min_t(size_t, sizeof(s), data_len));
^~~~~~
kernel/audit.c:1435:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sizes, bufp, 2 * sizeof(u32));
^~~~~~
kernel/audit.c:1435:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sizes, bufp, 2 * sizeof(u32));
^~~~~~
kernel/audit.c:1480:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig_data->ctx, ctx, len);
^~~~~~
kernel/audit.c:1480:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig_data->ctx, ctx, len);
^~~~~~
kernel/audit.c:1503:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1503:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&s, 0, sizeof(s));
^~~~~~
kernel/audit.c:1505:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s, data, min_t(size_t, sizeof(s), data_len));
^~~~~~
kernel/audit.c:1505:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s, data, min_t(size_t, sizeof(s), data_len));
^~~~~~
kernel/audit.c:1965:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(skb_tail_pointer(skb), avail, fmt, args);
^~~~~~~~~
kernel/audit.c:1965:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(skb_tail_pointer(skb), avail, fmt, args);
^~~~~~~~~
kernel/audit.c:1974:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(skb_tail_pointer(skb), avail, fmt, args2);
^~~~~~~~~
kernel/audit.c:1974:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(skb_tail_pointer(skb), avail, fmt, args2);
^~~~~~~~~
kernel/audit.c:2068:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, string, slen);
^~~~~~
kernel/audit.c:2068:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, string, slen);
^~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^~~~~~
kernel/time/posix-cpu-timers.c:1447:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&timer, 0, sizeof timer);
^~~~~~
kernel/time/posix-cpu-timers.c:1458:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&it, 0, sizeof(it));
^~~~~~
kernel/time/posix-cpu-timers.c:1458:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&it, 0, sizeof(it));
^~~~~~
Suppressed 28 warnings (28 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/xfs/xfs_bmap_item.c:579:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:579:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/xfs/xfs_buf_item_recover.c:505:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xfs_buf_offset(bp,
^~~~~~
fs/xfs/xfs_buf_item_recover.c:505:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(xfs_buf_offset(bp,
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/xfs/xfs_dquot_item_recover.c:148:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
fs/xfs/xfs_dquot_item_recover.c:148:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
kernel/crash_core.c:318:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, name, note->n_namesz);
^~~~~~
kernel/crash_core.c:318:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, name, note->n_namesz);
^~~~~~
kernel/crash_core.c:320:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, data, data_len);
^~~~~~
kernel/crash_core.c:320:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, data, data_len);
^~~~~~
kernel/crash_core.c:328:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(struct elf_note));
^~~~~~
kernel/crash_core.c:328:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(struct elf_note));
^~~~~~
kernel/crash_core.c:345:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, vmcoreinfo_data, vmcoreinfo_size);
^~~~~~
kernel/crash_core.c:345:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, vmcoreinfo_data, vmcoreinfo_size);
^~~~~~
kernel/crash_core.c:375:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vmcoreinfo_data[vmcoreinfo_size], buf, r);
^~~~~~
kernel/crash_core.c:375:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vmcoreinfo_data[vmcoreinfo_size], buf, r);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
lib/crypto/blake2s-generic.c:56:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:56:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, state->h, 32);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(v, state->h, 32);
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/arm/kernel/module-plts.c:48:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plt->lit, fixed_plts, sizeof(fixed_plts));
^~~~~~
arch/arm/kernel/module-plts.c:48:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plt->lit, fixed_plts, sizeof(fixed_plts));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 with check filters).
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
>> arch/arm/kernel/machine_kexec.c:170:17: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
reboot_entry = fncpy(reboot_code_buffer,
^
arch/arm/include/asm/fncpy.h:72:2: note: expanded from macro 'fncpy'
memcpy(dest_buf, (void const *)(__funcp_address & ~1), size); \
^~~~~~
arch/arm/kernel/machine_kexec.c:170:17: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
reboot_entry = fncpy(reboot_code_buffer,
^
arch/arm/include/asm/fncpy.h:72:2: note: expanded from macro 'fncpy'
memcpy(dest_buf, (void const *)(__funcp_address & ~1), size); \
^~~~~~
Suppressed 36 warnings (35 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
crypto/hmac.c:65:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ipad, inkey, keylen);
^~~~~~
crypto/hmac.c:65:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ipad, inkey, keylen);
^~~~~~
crypto/hmac.c:67:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ipad + keylen, 0, bs - keylen);
^~~~~~
crypto/hmac.c:67:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ipad + keylen, 0, bs - keylen);
^~~~~~
crypto/hmac.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(opad, ipad, bs);
^~~~~~
crypto/hmac.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(opad, ipad, bs);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
lib/rhashtable.c:792:21: warning: Value stored to 'p' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:792:21: note: Value stored to 'p' during its initialization is never read
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:1025:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1025:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1028:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
lib/rhashtable.c:1028:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
lib/string_helpers.c:112:12: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
remainder += rounding[j];
^ ~~~~~~~~~~~
lib/string_helpers.c:60:6: note: Assuming 'blk_size' is not equal to 0
if (blk_size == 0)
^~~~~~~~~~~~~
lib/string_helpers.c:60:2: note: Taking false branch
if (blk_size == 0)
^
lib/string_helpers.c:62:6: note: Assuming 'size' is not equal to 0
if (size == 0)
^~~~~~~~~
lib/string_helpers.c:62:2: note: Taking false branch
if (size == 0)
^
lib/string_helpers.c:76:2: note: Loop condition is false. Execution continues on line 81
while (blk_size >> 32) {
^
lib/string_helpers.c:81:2: note: Loop condition is false. Execution continues on line 88
while (size >> 32) {
--
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
lib/mpi/ec.c:209:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:209:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:260:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:260:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:263:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, n+LIMB_SIZE_25519-1, (wsize+1) * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:263:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m, n+LIMB_SIZE_25519-1, (wsize+1) * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:266:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n, m, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:266:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n, m, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:279:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(m, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:279:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(m, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:316:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:316:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:336:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:336:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:427:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:427:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:437:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:437:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
include/asm-generic/unaligned.h:32:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:183:2: note: Calling 'chacha_init'
chacha_init(chacha_state, k, (u8 *)iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:85:2: note: Taking false branch
if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CHACHA))
^
include/crypto/chacha.h:88:3: note: Calling 'chacha_init_generic'
chacha_init_generic(state, key, iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:78:14: note: Calling 'get_unaligned_le32'
state[13] = get_unaligned_le32(iv + 4);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/unaligned.h:32:2: note: Undefined or garbage value returned to caller
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
>> lib/crypto/chacha20poly1305-selftest.c:8844:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bottom_row[4], nonce, 12);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8844:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bottom_row[4], nonce, 12);
^~~~~~
>> lib/crypto/chacha20poly1305-selftest.c:8902:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8902:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8924:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(computed_output, chacha20poly1305_enc_vectors[i].input,
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8924:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(computed_output, chacha20poly1305_enc_vectors[i].input,
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8945:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8945:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8966:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(computed_output, chacha20poly1305_dec_vectors[i].input,
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8966:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(computed_output, chacha20poly1305_dec_vectors[i].input,
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8988:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:8988:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9007:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9007:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(computed_output, 0, MAXIMUM_TEST_BUFFER_LEN);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9027:7: warning: Value stored to 'total_len' is never read [clang-analyzer-deadcode.DeadStores]
for (total_len = POLY1305_DIGEST_SIZE; IS_ENABLED(DEBUG_CHACHA20POLY1305_SLOW_CHUNK_TEST)
^
lib/crypto/chacha20poly1305-selftest.c:9027:7: note: Value stored to 'total_len' is never read
lib/crypto/chacha20poly1305-selftest.c:9040:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(computed_output, 0, total_len);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9040:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(computed_output, 0, total_len);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9041:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(input, 0, total_len);
^~~~~~
lib/crypto/chacha20poly1305-selftest.c:9041:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(input, 0, total_len);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
crypto/md5.c:150:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md5.c:150:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md5.c:155:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md5.c:155:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md5.c:163:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md5.c:163:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md5.c:169:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, len);
^~~~~~
crypto/md5.c:169:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mctx->block, data, len);
^~~~~~
crypto/md5.c:183:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md5.c:183:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md5.c:189:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, padding);
^~~~~~
crypto/md5.c:189:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, padding);
^~~~~~
crypto/md5.c:196:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md5.c:196:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md5.c:197:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mctx, 0, sizeof(*mctx));
^~~~~~
crypto/md5.c:197:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
--
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:402:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(dt, &DTableH, sizeof(DTableH));
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:793:13: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(oLitEnd, match, sequence.matchLength);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:793:13: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
ZSTD_memmove(oLitEnd, match, sequence.matchLength);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:798:13: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(oLitEnd, match, length1);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:798:13: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
ZSTD_memmove(oLitEnd, match, length1);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:859:13: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(oLitEnd, match, sequence.matchLength);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:859:13: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
ZSTD_memmove(oLitEnd, match, sequence.matchLength);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:864:13: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(oLitEnd, match, length1);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:864:13: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
ZSTD_memmove(oLitEnd, match, length1);
^
lib/zstd/decompress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1215:13: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1215:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
73 warnings generated.
ipc/mqueue.c:327:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->attr, 0, sizeof(info->attr));
^~~~~~
ipc/mqueue.c:327:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->attr, 0, sizeof(info->attr));
^~~~~~
ipc/mqueue.c:631:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buffer, sizeof(buffer),
^~~~~~~~
ipc/mqueue.c:631:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buffer, sizeof(buffer),
^~~~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
>> ipc/mq_sysctl.c:25:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mq_table, table, sizeof(mq_table));
^~~~~~
ipc/mq_sysctl.c:25:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mq_table, table, sizeof(mq_table));
^~~~~~
ipc/mq_sysctl.c:35:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mq_table, table, sizeof(mq_table));
^~~~~~
ipc/mq_sysctl.c:35:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mq_table, table, sizeof(mq_table));
^~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
kernel/params.c:279:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(*(char **)kp->arg, val);
^~~~~~
kernel/params.c:279:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(*(char **)kp->arg, val);
^~~~~~
kernel/params.c:320:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%c\n", *(bool *)kp->arg ? 'Y' : 'N');
^~~~~~~
kernel/params.c:320:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%c\n", *(bool *)kp->arg ? 'Y' : 'N');
^~~~~~~
kernel/params.c:379:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%c\n", (*(bool *)kp->arg) ? 'N' : 'Y');
^~~~~~~
kernel/params.c:379:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%c\n", (*(bool *)kp->arg) ? 'N' : 'Y');
^~~~~~~
kernel/params.c:519:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(kps->string, val);
^~~~~~
kernel/params.c:519:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(kps->string, val);
^~~~~~
kernel/params.c:668:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mk->mp->attrs[mk->mp->num], 0, sizeof(mk->mp->attrs[0]));
^~~~~~
kernel/params.c:668:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mk->mp->attrs[mk->mp->num], 0, sizeof(mk->mp->attrs[0]));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
kernel/kexec_core.c:771:4: warning: Value stored to 'addr' is never read [clang-analyzer-deadcode.DeadStores]
addr = old_addr;
^ ~~~~~~~~
kernel/kexec_core.c:771:4: note: Value stored to 'addr' is never read
addr = old_addr;
^ ~~~~~~~~
kernel/kexec_core.c:791:2: warning: Value stored to 'result' is never read [clang-analyzer-deadcode.DeadStores]
result = 0;
^ ~
kernel/kexec_core.c:791:2: note: Value stored to 'result' is never read
result = 0;
^ ~
kernel/kexec_core.c:821:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
clear_page(ptr);
^
arch/arm/include/asm/page.h:139:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((void *)(page), 0, PAGE_SIZE)
^~~~~~
kernel/kexec_core.c:821:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
clear_page(ptr);
^
arch/arm/include/asm/page.h:139:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((void *)(page), 0, PAGE_SIZE)
^~~~~~
kernel/kexec_core.c:829:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, kbuf, uchunk);
^~~~~~
kernel/kexec_core.c:829:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, kbuf, uchunk);
^~~~~~
kernel/kexec_core.c:890:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr + uchunk, 0, mchunk - uchunk);
^~~~~~
kernel/kexec_core.c:890:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr + uchunk, 0, mchunk - uchunk);
^~~~~~
kernel/kexec_core.c:895:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, kbuf, uchunk);
^~~~~~
kernel/kexec_core.c:895:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, kbuf, uchunk);
^~~~~~
kernel/kexec_core.c:1079:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&prstatus, 0, sizeof(prstatus));
^~~~~~
kernel/kexec_core.c:1079:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&prstatus, 0, sizeof(prstatus));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
crypto/jitterentropy-kcapi.c:69:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, src, n);
--
^
drivers/pwm/core.c:850:6: note: Calling 'IS_ERR'
if (IS_ERR(pwm))
^~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pwm/core.c:850:6: note: Returning from 'IS_ERR'
if (IS_ERR(pwm))
^~~~~~~~~~~
drivers/pwm/core.c:850:2: note: Taking false branch
if (IS_ERR(pwm))
^
drivers/pwm/core.c:854:6: note: Calling 'IS_ERR'
if (IS_ERR(dl)) {
^~~~~~~~~~
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pwm/core.c:854:6: note: Returning from 'IS_ERR'
if (IS_ERR(dl)) {
^~~~~~~~~~
drivers/pwm/core.c:854:2: note: Taking false branch
if (IS_ERR(dl)) {
^
drivers/pwm/core.c:866:7: note: 'con_id' is null
if (!con_id) {
^~~~~~
drivers/pwm/core.c:866:2: note: Taking true branch
if (!con_id) {
^
drivers/pwm/core.c:869:7: note: 'err' is < 0
if (err < 0)
^~~
drivers/pwm/core.c:869:3: note: Taking true branch
if (err < 0)
^
drivers/pwm/core.c:870:13: note: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'np')
con_id = np->name;
^~
drivers/pwm/core.c:906:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/pwm/core.c:906:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
kernel/rcu/tree.c:279:2: warning: Value stored to 'seq' is never read [clang-analyzer-deadcode.DeadStores]
seq = rcu_dynticks_inc(1);
^ ~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:279:2: note: Value stored to 'seq' is never read
seq = rcu_dynticks_inc(1);
^ ~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:298:2: warning: Value stored to 'seq' is never read [clang-analyzer-deadcode.DeadStores]
seq = rcu_dynticks_inc(1);
^ ~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:298:2: note: Value stored to 'seq' is never read
seq = rcu_dynticks_inc(1);
^ ~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:2383:19: warning: Value stored to 'rnp' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct rcu_node *rnp = rdp->mynode;
^~~ ~~~~~~~~~~~
kernel/rcu/tree.c:2383:19: note: Value stored to 'rnp' during its initialization is never read
struct rcu_node *rnp = rdp->mynode;
^~~ ~~~~~~~~~~~
kernel/rcu/tree.c:2448:19: warning: Value stored to 'rnp' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct rcu_node *rnp = rdp->mynode; /* Outgoing CPU's rdp & rnp. */
^~~ ~~~~~~~~~~~
kernel/rcu/tree.c:2448:19: note: Value stored to 'rnp' during its initialization is never read
struct rcu_node *rnp = rdp->mynode; /* Outgoing CPU's rdp & rnp. */
^~~ ~~~~~~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (26 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> lib/decompress_unlzo.c:163:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(in_buf_save, in_buf, in_len);
^~~~~~
lib/decompress_unlzo.c:163:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(in_buf_save, in_buf, in_len);
^~~~~~
lib/decompress_unlzo.c:232:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out_buf, in_buf, src_len);
^~~~~~
lib/decompress_unlzo.c:232:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out_buf, in_buf, src_len);
^~~~~~
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (26 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (26 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
lib/dump_stack.c:35:2: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
lib/dump_stack.c:35:2: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
block/partitions/amiga.c:76:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), " RDSK (%d)", blksize * 512);
^~~~~~~~
block/partitions/amiga.c:76:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), " RDSK (%d)", blksize * 512);
^~~~~~~~
block/partitions/amiga.c:118:19: warning: The left operand of '<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (dostype[3] < ' ')
~~~~~~~~~~ ^
block/partitions/amiga.c:38:2: note: Loop condition is true. Entering loop body
for (blk = 0; ; blk++, put_dev_sector(sect)) {
^
block/partitions/amiga.c:39:7: note: 'blk' is not equal to RDB_ALLOCATION_LIMIT
if (blk == RDB_ALLOCATION_LIMIT)
^~~
block/partitions/amiga.c:39:3: note: Taking false branch
if (blk == RDB_ALLOCATION_LIMIT)
^
block/partitions/amiga.c:42:7: note: Assuming 'data' is non-null
if (!data) {
^~~~~
block/partitions/amiga.c:42:3: note: Taking false branch
if (!data) {
^
block/partitions/amiga.c:48:7: note: Assuming the condition is false
if (*(__be32 *)data != cpu_to_be32(IDNAME_RIGIDDISK))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/partitions/amiga.c:48:3: note: Taking false branch
if (*(__be32 *)data != cpu_to_be32(IDNAME_RIGIDDISK))
^
block/partitions/amiga.c:52:7: note: Assuming the condition is true
if (checksum_block((__be32 *)data, be32_to_cpu(rdb->rdb_SummedLongs) & 0x7F) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/partitions/amiga.c:52:3: note: Taking true branch
if (checksum_block((__be32 *)data, be32_to_cpu(rdb->rdb_SummedLongs) & 0x7F) == 0)
^
block/partitions/amiga.c:53:4: note: Execution continues on line 70
break;
^
block/partitions/amiga.c:81:17: note: Assuming 'blk' is > 0
for (part = 1; blk>0 && part<=16; part++, put_dev_sector(sect)) {
^~~~~
block/partitions/amiga.c:81:17: note: Left side of '&&' is true
block/partitions/amiga.c:81:2: note: Loop condition is true. Entering loop body
for (part = 1; blk>0 && part<=16; part++, put_dev_sector(sect)) {
^
block/partitions/amiga.c:84:7: note: Assuming 'data' is non-null
if (!data) {
^~~~~
block/partitions/amiga.c:84:3: note: Taking false branch
if (!data) {
^
block/partitions/amiga.c:92:7: note: Assuming the condition is false
if (pb->pb_ID != cpu_to_be32(IDNAME_PARTITION))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/partitions/amiga.c:92:3: note: Taking false branch
if (pb->pb_ID != cpu_to_be32(IDNAME_PARTITION))
^
block/partitions/amiga.c:94:7: note: Assuming the condition is false
if (checksum_block((__be32 *)pb, be32_to_cpu(pb->pb_SummedLongs) & 0x7F) != 0 )
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/partitions/amiga.c:94:3: note: Taking false branch
if (checksum_block((__be32 *)pb, be32_to_cpu(pb->pb_SummedLongs) & 0x7F) != 0 )
^
block/partitions/amiga.c:104:7: note: Assuming 'nr_sects' is not equal to 0
if (!nr_sects)
^~~~~~~~~
block/partitions/amiga.c:104:3: note: Taking false branch
--
lib/bootconfig.c:290:2: note: Loop condition is true. Entering loop body
while (node && node != root) {
^
lib/bootconfig.c:292:7: note: 'depth' is not equal to XBC_DEPTH_MAX
if (depth == XBC_DEPTH_MAX)
^~~~~
lib/bootconfig.c:292:3: note: Taking false branch
if (depth == XBC_DEPTH_MAX)
^
lib/bootconfig.c:294:10: note: Calling 'xbc_node_get_parent'
node = xbc_node_get_parent(node);
^~~~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:131:9: note: Assuming field 'parent' is not equal to XBC_NODE_MAX
return node->parent == XBC_NODE_MAX ? NULL : &xbc_nodes[node->parent];
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:131:9: note: '?' condition is false
lib/bootconfig.c:131:2: note: Returning pointer, which participates in a condition later
return node->parent == XBC_NODE_MAX ? NULL : &xbc_nodes[node->parent];
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:294:10: note: Returning from 'xbc_node_get_parent'
node = xbc_node_get_parent(node);
^~~~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:290:9: note: Assuming 'node' is null
while (node && node != root) {
^~~~
lib/bootconfig.c:290:14: note: Left side of '&&' is false
while (node && node != root) {
^
lib/bootconfig.c:296:7: note: 'node' is null
if (!node && root)
^~~~
lib/bootconfig.c:296:6: note: Left side of '&&' is true
if (!node && root)
^
lib/bootconfig.c:296:15: note: Assuming 'root' is null
if (!node && root)
^~~~
lib/bootconfig.c:296:2: note: Taking false branch
if (!node && root)
^
lib/bootconfig.c:299:2: note: Loop condition is true. Entering loop body
while (--depth >= 0) {
^
lib/bootconfig.c:300:3: note: Null pointer value stored to 'node'
node = xbc_nodes + keys[depth];
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:301:55: note: Passing null pointer value via 1st parameter 'node'
ret = snprintf(buf, size, "%s%s", xbc_node_get_data(node),
^~~~
lib/bootconfig.c:301:37: note: Calling 'xbc_node_get_data'
ret = snprintf(buf, size, "%s%s", xbc_node_get_data(node),
^~~~~~~~~~~~~~~~~~~~~~~
lib/bootconfig.c:169:15: note: Access to field 'data' results in a dereference of a null pointer (loaded from variable 'node')
int offset = node->data & ~XBC_VALUE;
^~~~
lib/bootconfig.c:301:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(buf, size, "%s%s", xbc_node_get_data(node),
^~~~~~~~
lib/bootconfig.c:301:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(buf, size, "%s%s", xbc_node_get_data(node),
^~~~~~~~
lib/bootconfig.c:945:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xbc_data, data, size);
^~~~~~
lib/bootconfig.c:945:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(xbc_data, data, size);
^~~~~~
lib/bootconfig.c:956:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(xbc_nodes, 0, sizeof(struct xbc_node) * XBC_NODE_MAX);
^~~~~~
lib/bootconfig.c:956:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(xbc_nodes, 0, sizeof(struct xbc_node) * XBC_NODE_MAX);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/dma/dw/dw.c:93:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dw->name, sizeof(dw->name), "dw:dmac%d", id);
^~~~~~~~
drivers/dma/dw/dw.c:93:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dw->name, sizeof(dw->name), "dw:dmac%d", id);
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/dma/dw/idma32.c:219:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dw->name, sizeof(dw->name), "idma32:dmac%d", id);
^~~~~~~~
drivers/dma/dw/idma32.c:219:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dw->name, sizeof(dw->name), "idma32:dmac%d", id);
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/dma/sh/shdma-base.c:334:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cb, 0, sizeof(cb));
^~~~~~
drivers/dma/sh/shdma-base.c:334:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cb, 0, sizeof(cb));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/xfs/libxfs/xfs_rtbitmap.c:349:8: warning: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp' [clang-analyzer-deadcode.DeadStores]
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:349:8: note: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp'
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:394:8: warning: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp' [clang-analyzer-deadcode.DeadStores]
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:394:8: note: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp'
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:847:8: warning: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp' [clang-analyzer-deadcode.DeadStores]
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:847:8: note: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp'
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:893:8: warning: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp' [clang-analyzer-deadcode.DeadStores]
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
fs/xfs/libxfs/xfs_rtbitmap.c:893:8: note: Although the value stored to 'bufp' is used in the enclosing expression, the value is never actually read from 'bufp'
b = bufp = bp->b_addr;
^ ~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
drivers/base/core.c:542:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:542:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:547:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "supplier:%s:%s", dev_bus_name(sup), dev_name(sup));
^~~~~~~~
drivers/base/core.c:547:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "supplier:%s:%s", dev_bus_name(sup), dev_name(sup));
^~~~~~~~
drivers/base/core.c:555:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:555:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:589:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "supplier:%s:%s", dev_bus_name(sup), dev_name(sup));
^~~~~~~~
drivers/base/core.c:589:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "supplier:%s:%s", dev_bus_name(sup), dev_name(sup));
^~~~~~~~
drivers/base/core.c:592:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:592:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, len, "consumer:%s:%s", dev_bus_name(con), dev_name(con));
^~~~~~~~
drivers/base/core.c:2690:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return print_dev_t(buf, dev->devt);
^
include/linux/kdev_t.h:15:2: note: expanded from macro 'print_dev_t'
sprintf((buffer), "%u:%u\n", MAJOR(dev), MINOR(dev))
^~~~~~~
drivers/base/core.c:2690:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return print_dev_t(buf, dev->devt);
^
include/linux/kdev_t.h:15:2: note: expanded from macro 'print_dev_t'
sprintf((buffer), "%u:%u\n", MAJOR(dev), MINOR(dev))
^~~~~~~
drivers/base/core.c:3229:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
format_dev_t(devt_str, dev->devt);
^
include/linux/kdev_t.h:19:3: note: expanded from macro 'format_dev_t'
sprintf(buffer, "%u:%u", MAJOR(dev), MINOR(dev)); \
^~~~~~~
drivers/base/core.c:3229:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
format_dev_t(devt_str, dev->devt);
^
include/linux/kdev_t.h:19:3: note: expanded from macro 'format_dev_t'
sprintf(buffer, "%u:%u", MAJOR(dev), MINOR(dev)); \
^~~~~~~
drivers/base/core.c:3242:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
format_dev_t(devt_str, dev->devt);
^
include/linux/kdev_t.h:19:3: note: expanded from macro 'format_dev_t'
sprintf(buffer, "%u:%u", MAJOR(dev), MINOR(dev)); \
--
^ ~~~~~~~~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:806:9: warning: 4th function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
return sprintf(buf, "%s %d %d %d\n", res,
^
drivers/misc/lis3lv02d/lis3lv02d.c:794:10: note: Calling 'lis3lv02d_selftest'
switch (lis3lv02d_selftest(lis3, values)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:276:6: note: Assuming field 'whoami' is not equal to WAI_8B
if (lis3->whoami == WAI_8B) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:276:2: note: Taking false branch
if (lis3->whoami == WAI_8B) {
^
drivers/misc/lis3lv02d/lis3lv02d.c:289:7: note: Assuming field 'whoami' is equal to WAI_3DC
if ((lis3->whoami == WAI_3DC) || (lis3->whoami == WAI_3DLH)) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:289:32: note: Left side of '||' is true
if ((lis3->whoami == WAI_3DC) || (lis3->whoami == WAI_3DLH)) {
^
drivers/misc/lis3lv02d/lis3lv02d.c:303:6: note: 'ret' is -6
if (ret)
^~~
drivers/misc/lis3lv02d/lis3lv02d.c:303:2: note: Taking true branch
if (ret)
^
drivers/misc/lis3lv02d/lis3lv02d.c:304:3: note: Control jumps to line 356
goto fail;
^
drivers/misc/lis3lv02d/lis3lv02d.c:357:2: note: Returning without writing to '*results'
return ret;
^
drivers/misc/lis3lv02d/lis3lv02d.c:794:10: note: Returning from 'lis3lv02d_selftest'
switch (lis3lv02d_selftest(lis3, values)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:794:2: note: Control jumps to the 'default' case at line 802
switch (lis3lv02d_selftest(lis3, values)) {
^
drivers/misc/lis3lv02d/lis3lv02d.c:804:3: note: Execution continues on line 806
break;
^
drivers/misc/lis3lv02d/lis3lv02d.c:806:9: note: 4th function call argument is an uninitialized value
return sprintf(buf, "%s %d %d %d\n", res,
^
drivers/misc/lis3lv02d/lis3lv02d.c:806:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s %d %d %d\n", res,
^~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:806:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s %d %d %d\n", res,
^~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:820:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "(%d,%d,%d)\n", x, y, z);
^~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:820:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "(%d,%d,%d)\n", x, y, z);
^~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:832:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", lis3->odrs[odr_idx]);
^~~~~~~
drivers/misc/lis3lv02d/lis3lv02d.c:832:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", lis3->odrs[odr_idx]);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/dma/sf-pdma/sf-pdma.c:59:6: warning: Access to field 'desc' results in a dereference of a null pointer (loaded from variable 'chan') [clang-analyzer-core.NullDereference]
if (chan->desc && !chan->desc->in_use) {
^
drivers/dma/sf-pdma/sf-pdma.c:95:2: note: 'chan' initialized here
struct sf_pdma_chan *chan = to_sf_pdma_chan(dchan);
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/sf-pdma/sf-pdma.c:99:6: note: Assuming 'chan' is null
if (chan && (!len || !dest || !src)) {
^~~~
drivers/dma/sf-pdma/sf-pdma.c:99:11: note: Left side of '&&' is false
if (chan && (!len || !dest || !src)) {
^
drivers/dma/sf-pdma/sf-pdma.c:105:28: note: Passing null pointer value via 1st parameter 'chan'
desc = sf_pdma_alloc_desc(chan);
^~~~
drivers/dma/sf-pdma/sf-pdma.c:105:9: note: Calling 'sf_pdma_alloc_desc'
desc = sf_pdma_alloc_desc(chan);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/sf-pdma/sf-pdma.c:57:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&chan->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/dma/sf-pdma/sf-pdma.c:57:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&chan->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/dma/sf-pdma/sf-pdma.c:59:6: note: Access to field 'desc' results in a dereference of a null pointer (loaded from variable 'chan')
if (chan->desc && !chan->desc->in_use) {
^~~~
>> drivers/dma/sf-pdma/sf-pdma.c:126:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&chan->cfg, cfg, sizeof(*cfg));
^~~~~~
drivers/dma/sf-pdma/sf-pdma.c:126:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chan->cfg, cfg, sizeof(*cfg));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/max8660.c:396:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(of_node, 0, sizeof(of_node));
^~~~~~
drivers/regulator/max8660.c:396:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(of_node, 0, sizeof(of_node));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/max8997-regulator.c:1047:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(max8997->buck125_gpios, pdata->buck125_gpios, sizeof(int) * 3);
^~~~~~
drivers/regulator/max8997-regulator.c:1047:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(max8997->buck125_gpios, pdata->buck125_gpios, sizeof(int) * 3);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/edac/edac_device_sysfs.c:35:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", ctl_info->log_ue);
^~~~~~~
drivers/edac/edac_device_sysfs.c:35:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", ctl_info->log_ue);
^~~~~~~
drivers/edac/edac_device_sysfs.c:52:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", ctl_info->log_ce);
^~~~~~~
drivers/edac/edac_device_sysfs.c:52:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", ctl_info->log_ce);
^~~~~~~
drivers/edac/edac_device_sysfs.c:69:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", ctl_info->panic_on_ue);
^~~~~~~
drivers/edac/edac_device_sysfs.c:69:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", ctl_info->panic_on_ue);
^~~~~~~
drivers/edac/edac_device_sysfs.c:86:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", ctl_info->poll_msec);
^~~~~~~
drivers/edac/edac_device_sysfs.c:86:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", ctl_info->poll_msec);
^~~~~~~
drivers/edac/edac_device_sysfs.c:245:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&edac_dev->kobj, 0, sizeof(struct kobject));
^~~~~~
drivers/edac/edac_device_sysfs.c:245:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&edac_dev->kobj, 0, sizeof(struct kobject));
^~~~~~
drivers/edac/edac_device_sysfs.c:312:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", instance->counters.ue_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:312:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", instance->counters.ue_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:318:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", instance->counters.ce_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:318:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", instance->counters.ce_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:419:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", block->counters.ue_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:419:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", block->counters.ue_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:427:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(data, "%u\n", block->counters.ce_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:427:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(data, "%u\n", block->counters.ce_count);
^~~~~~~
drivers/edac/edac_device_sysfs.c:523:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&block->kobj, 0, sizeof(struct kobject));
^~~~~~
drivers/edac/edac_device_sysfs.c:523:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&block->kobj, 0, sizeof(struct kobject));
--
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1220:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "none\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1220:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "none\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1222:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "host\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1222:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "host\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1224:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "dedicated\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1224:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "dedicated\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1226:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "boost\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1226:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "boost\n");
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1244:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%x %x", ®, &val) != 2)
^~~~~~
drivers/power/supply/bq2415x_charger.c:1244:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%x %x", ®, &val) != 2)
^~~~~~
drivers/power/supply/bq2415x_charger.c:1264:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#.2x=error %d\n", reg, ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1264:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#.2x=error %d\n", reg, ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1265:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#.2x=%#.2x\n", reg, ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1265:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#.2x=%#.2x\n", reg, ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1341:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1341:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1404:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1404:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1501:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(revstr, "1.%d", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1501:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(revstr, "1.%d", ret);
^~~~~~~
drivers/power/supply/bq2415x_charger.c:1622:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bq->init_data, pdata, sizeof(bq->init_data));
^~~~~~
drivers/power/supply/bq2415x_charger.c:1622:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bq->init_data, pdata, sizeof(bq->init_data));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/pinctrl/devicetree.c:380:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(out_args, 0, sizeof(*out_args));
^~~~~~
drivers/pinctrl/devicetree.c:380:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(out_args, 0, sizeof(*out_args));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/pinctrl/pinctrl-ocelot.c:1282:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = 0;
^ ~
drivers/pinctrl/pinctrl-ocelot.c:1282:3: note: Value stored to 'ret' is never read
ret = 0;
^ ~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
>> drivers/platform/chrome/cros_ec_proto.c:79:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out + sizeof(*request), msg->data, msg->outsize);
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:79:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out + sizeof(*request), msg->data, msg->outsize);
^~~~~~
>> drivers/platform/chrome/cros_ec_proto.c:277:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg, 0, sizeof(*msg));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:277:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg, 0, sizeof(*msg));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg, 0, sizeof(*msg));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg, 0, sizeof(*msg));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:688:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ec_dev->event_data.data, msg->data,
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:688:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ec_dev->event_data.data, msg->data,
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:824:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(features, 0, sizeof(*features));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:824:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(features, 0, sizeof(*features));
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:935:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:935:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:942:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(indata, msg->data, insize);
^~~~~~
drivers/platform/chrome/cros_ec_proto.c:942:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(indata, msg->data, insize);
^~~~~~
Suppressed 17 warnings (10 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/splice.c:725:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return ret;
^ ~~~
fs/splice.c:630:2: note: 'ret' declared without an initial value
ssize_t ret;
^~~~~~~~~~~
fs/splice.c:632:15: note: Assuming 'array' is non-null
if (unlikely(!array))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/splice.c:632:2: note: Taking false branch
if (unlikely(!array))
^
fs/splice.c:638:2: note: Loop condition is false. Execution continues on line 717
while (sd.total_len) {
^
fs/splice.c:722:9: note: Field 'num_spliced' is 0
if (sd.num_spliced)
^
fs/splice.c:722:2: note: Taking false branch
if (sd.num_spliced)
^
fs/splice.c:725:2: note: Undefined or garbage value returned to caller
return ret;
^ ~~~
fs/splice.c:853:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = 0;
^ ~
fs/splice.c:853:2: note: Value stored to 'ret' is never read
ret = 0;
^ ~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
fs/notify/mark.c:841:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mark, 0, sizeof(*mark));
^~~~~~
fs/notify/mark.c:841:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mark, 0, sizeof(*mark));
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/fpga/fpga-mgr.c:447:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", mgr->name);
--
^
drivers/i3c/device.c:219:2: note: Returning from 'i3c_device_get_info'
i3c_device_get_info(i3cdev, &devinfo);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i3c/device.c:221:10: note: The left operand of '&' is a garbage value
manuf = I3C_PID_MANUF_ID(devinfo.pid);
^
include/linux/i3c/device.h:79:40: note: expanded from macro 'I3C_PID_MANUF_ID'
#define I3C_PID_MANUF_ID(pid) (((pid) & GENMASK_ULL(47, 33)) >> 33)
~~~ ^
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/i3c/master.c:141:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%x\n", desc->info.bcr);
^~~~~~~
drivers/i3c/master.c:141:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%x\n", desc->info.bcr);
^~~~~~~
drivers/i3c/master.c:158:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%x\n", desc->info.dcr);
^~~~~~~
drivers/i3c/master.c:158:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%x\n", desc->info.dcr);
^~~~~~~
drivers/i3c/master.c:175:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%llx\n", desc->info.pid);
^~~~~~~
drivers/i3c/master.c:175:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%llx\n", desc->info.pid);
^~~~~~~
drivers/i3c/master.c:192:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%02x\n", desc->info.dyn_addr);
^~~~~~~
drivers/i3c/master.c:192:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%02x\n", desc->info.dyn_addr);
^~~~~~~
drivers/i3c/master.c:223:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf + offset, offset ? " %s" : "%s",
^~~~~~~
drivers/i3c/master.c:223:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf + offset, offset ? " %s" : "%s",
^~~~~~~
drivers/i3c/master.c:231:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf + offset, "\n");
^~~~~~~
drivers/i3c/master.c:231:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf + offset, "\n");
^~~~~~~
drivers/i3c/master.c:257:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "i3c:dcr%02Xmanuf%04X", devinfo.dcr,
^~~~~~~
drivers/i3c/master.c:257:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "i3c:dcr%02Xmanuf%04X", devinfo.dcr,
^~~~~~~
drivers/i3c/master.c:260:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "i3c:dcr%02Xmanuf%04Xpart%04Xext%04X",
^~~~~~~
drivers/i3c/master.c:260:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "i3c:dcr%02Xmanuf%04Xpart%04Xext%04X",
^~~~~~~
drivers/i3c/master.c:462:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "unknown\n");
^~~~~~~
drivers/i3c/master.c:462:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "unknown\n");
^~~~~~~
drivers/i3c/master.c:464:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%s\n", i3c_bus_mode_strings[i3cbus->mode]);
^~~~~~~
drivers/i3c/master.c:464:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%s\n", i3c_bus_mode_strings[i3cbus->mode]);
^~~~~~~
drivers/i3c/master.c:479:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d-%llx\n", i3cbus->id,
^~~~~~~
drivers/i3c/master.c:479:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d-%llx\n", i3cbus->id,
^~~~~~~
drivers/i3c/master.c:495:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%ld\n", i3cbus->scl_rate.i3c);
^~~~~~~
drivers/i3c/master.c:495:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%ld\n", i3cbus->scl_rate.i3c);
^~~~~~~
drivers/i3c/master.c:510:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%ld\n", i3cbus->scl_rate.i2c);
^~~~~~~
drivers/i3c/master.c:510:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%ld\n", i3cbus->scl_rate.i2c);
^~~~~~~
drivers/i3c/master.c:2183:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(adap->name, dev_name(master->dev.parent), sizeof(adap->name));
^~~~~~~
drivers/i3c/master.c:2183:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(adap->name, dev_name(master->dev.parent), sizeof(adap->name));
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> kernel/trace/trace_kprobe.c:148:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "0x%p", tk->rp.kp.addr);
^~~~~~~~
kernel/trace/trace_kprobe.c:148:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "0x%p", tk->rp.kp.addr);
^~~~~~~~
kernel/trace/trace_kprobe.c:150:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "%s+%u",
^~~~~~~~
kernel/trace/trace_kprobe.c:150:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "%s+%u",
^~~~~~~~
kernel/trace/trace_kprobe.c:153:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "%s", trace_kprobe_symbol(tk));
^~~~~~~~
kernel/trace/trace_kprobe.c:153:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "%s", trace_kprobe_symbol(tk));
^~~~~~~~
>> kernel/trace/trace_kprobe.c:775:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &argv[0][1], len);
^~~~~~
kernel/trace/trace_kprobe.c:775:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &argv[0][1], len);
^~~~~~
kernel/trace/trace_kprobe.c:843:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_EVENT_NAME_LEN, "%c_%s_%ld",
^~~~~~~~
kernel/trace/trace_kprobe.c:843:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_EVENT_NAME_LEN, "%c_%s_%ld",
^~~~~~~~
kernel/trace/trace_kprobe.c:846:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_EVENT_NAME_LEN, "%c_0x%p",
^~~~~~~~
kernel/trace/trace_kprobe.c:846:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_EVENT_NAME_LEN, "%c_0x%p",
^~~~~~~~
kernel/trace/trace_kprobe.c:975:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_EVENT_NAME_LEN, "r:kprobes/%s", name);
^~~~~~~~
kernel/trace/trace_kprobe.c:975:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_EVENT_NAME_LEN, "r:kprobes/%s", name);
^~~~~~~~
kernel/trace/trace_kprobe.c:977:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_EVENT_NAME_LEN, "p:kprobes/%s", name);
^~~~~~~~
kernel/trace/trace_kprobe.c:977:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_EVENT_NAME_LEN, "p:kprobes/%s", name);
^~~~~~~~
kernel/trace/trace_kprobe.c:1077:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, MAX_EVENT_NAME_LEN, "-:%s", name);
^~~~~~~~
kernel/trace/trace_kprobe.c:1077:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, MAX_EVENT_NAME_LEN, "-:%s", name);
^~~~~~~~
>> kernel/trace/trace_kprobe.c:1595:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&entry[1], 0, dsize);
^~~~~~
kernel/trace/trace_kprobe.c:1595:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&entry[1], 0, dsize);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
4 warnings generated.
lib/zstd/common/fse_decompress.c:101:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(dt, &DTableH, sizeof(DTableH));
^
lib/zstd/common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/common/fse_decompress.c:101:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(dt, &DTableH, sizeof(DTableH));
^
lib/zstd/common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/mfd/sky81452.c:47:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cells, 0, sizeof(cells));
^~~~~~
drivers/mfd/sky81452.c:47:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cells, 0, sizeof(cells));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
Suppressed 21 warnings (21 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/scsi/sg.c:504:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(old_hdr->sense_buffer, srp->sense_b,
^~~~~~
drivers/scsi/sg.c:504:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(old_hdr->sense_buffer, srp->sense_b,
^~~~~~
drivers/scsi/sg.c:702:3: warning: 4th function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
printk_ratelimited(KERN_WARNING
^
include/linux/printk.h:640:3: note: expanded from macro 'printk_ratelimited'
printk(fmt, ##__VA_ARGS__); \
^ ~~~~~~~~~~~
include/linux/printk.h:446:44: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^ ~~~~~~~~~~~
include/linux/printk.h:418:3: note: expanded from macro 'printk_index_wrap'
_p_func(_fmt, ##__VA_ARGS__); \
^ ~~~~~~~~~~~
drivers/scsi/sg.c:616:11: note: Calling 'sg_check_file_access'
retval = sg_check_file_access(filp, __func__);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/sg.c:222:22: note: Left side of '&&' is false
if (filp->f_cred != current_real_cred()) {
^
include/linux/cred.h:308:2: note: expanded from macro 'current_real_cred'
rcu_dereference_protected(current->real_cred, 1)
^
include/linux/rcupdate.h:594:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^
include/linux/rcupdate.h:398:2: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
include/linux/rcupdate.h:319:11: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
drivers/scsi/sg.c:222:22: note: Loop condition is false. Exiting loop
if (filp->f_cred != current_real_cred()) {
^
include/linux/cred.h:308:2: note: expanded from macro 'current_real_cred'
--
^
include/linux/hid.h:1035:2: note: Taking true branch
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1036:3: note: Assuming the condition is true
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/printk.h:639:6: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^~~~~~~~~~~~~~~~~
include/linux/ratelimit_types.h:41:28: note: expanded from macro '__ratelimit'
#define __ratelimit(state) ___ratelimit(state, __func__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1036:3: note: Taking true branch
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:639:2: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^
include/linux/hid.h:1036:3: note: Loop condition is false. Exiting loop
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:640:3: note: expanded from macro 'printk_ratelimited'
printk(fmt, ##__VA_ARGS__); \
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
include/linux/hid.h:1037:9: note: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input')
input->name, c, type);
^
include/linux/printk.h:656:49: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~
include/linux/printk.h:640:17: note: expanded from macro 'printk_ratelimited'
printk(fmt, ##__VA_ARGS__); \
^~~~~~~~~~~
include/linux/printk.h:446:60: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^~~~~~~~~~~
include/linux/printk.h:418:19: note: expanded from macro 'printk_index_wrap'
_p_func(_fmt, ##__VA_ARGS__); \
^~~~~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
block/blk-crypto-profile.c:80:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(profile, 0, sizeof(*profile));
^~~~~~
block/blk-crypto-profile.c:80:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(profile, 0, sizeof(*profile));
^~~~~~
block/blk-crypto-profile.c:491:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(parent->modes_supported, 0,
^~~~~~
block/blk-crypto-profile.c:491:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(parent->modes_supported, 0,
^~~~~~
block/blk-crypto-profile.c:555:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst->modes_supported, src->modes_supported,
^~~~~~
block/blk-crypto-profile.c:555:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst->modes_supported, src->modes_supported,
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
drivers/cpufreq/s3c24xx-cpufreq.c:65:21: warning: Although the value stored to 'armclk' is used in the enclosing expression, the value is never actually read from 'armclk' [clang-analyzer-deadcode.DeadStores]
cfg->freq.armclk = armclk = clk_get_rate(clk_arm);
^ ~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/s3c24xx-cpufreq.c:65:21: note: Although the value stored to 'armclk' is used in the enclosing expression, the value is never actually read from 'armclk'
cfg->freq.armclk = armclk = clk_get_rate(clk_arm);
^ ~~~~~~~~~~~~~~~~~~~~~
>> drivers/cpufreq/s3c24xx-cpufreq.c:635:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vals, plls, size);
^~~~~~
drivers/cpufreq/s3c24xx-cpufreq.c:635:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vals, plls, size);
^~~~~~
include/linux/cpufreq.h:1022:22: warning: Branch condition evaluates to a garbage value [clang-analyzer-core.uninitialized.Branch]
bool efficiencies = policy->efficiencies_available &&
^
drivers/cpufreq/s3c24xx-cpufreq.c:280:6: note: Assuming 'target_freq' is not equal to 'last_target'
if (target_freq == last_target)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/s3c24xx-cpufreq.c:280:2: note: Taking false branch
if (target_freq == last_target)
^
drivers/cpufreq/s3c24xx-cpufreq.c:285:2: note: Loop condition is false. Exiting loop
s3c_freq_dbg("%s: policy %p, target %u, relation %u\n",
^
include/linux/soc/samsung/s3c-cpufreq-core.h:260:28: note: expanded from macro 's3c_freq_dbg'
#define s3c_freq_dbg(x...) printk(KERN_INFO x)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/cpufreq/s3c24xx-cpufreq.c:288:6: note: Assuming 'ftab' is null
if (ftab) {
^~~~
drivers/cpufreq/s3c24xx-cpufreq.c:288:2: note: Taking false branch
if (ftab) {
^
drivers/cpufreq/s3c24xx-cpufreq.c:301:6: note: Assuming 'pll_reg' is non-null
if (!pll_reg || cpu_cur.lock_pll) {
^~~~~~~~
drivers/cpufreq/s3c24xx-cpufreq.c:301:6: note: Left side of '||' is false
drivers/cpufreq/s3c24xx-cpufreq.c:301:18: note: Assuming field 'lock_pll' is 0
if (!pll_reg || cpu_cur.lock_pll) {
^~~~~~~~~~~~~~~~
drivers/cpufreq/s3c24xx-cpufreq.c:301:2: note: Taking false branch
if (!pll_reg || cpu_cur.lock_pll) {
^
drivers/cpufreq/s3c24xx-cpufreq.c:320:11: note: Calling 'cpufreq_frequency_table_target'
index = cpufreq_frequency_table_target(&tmp_policy, target_freq,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cpufreq.h:1022:22: note: Branch condition evaluates to a garbage value
bool efficiencies = policy->efficiencies_available &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 17 warnings (16 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> drivers/regulator/pwm-regulator.c:335:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&drvdata->desc, &pwm_regulator_desc, sizeof(drvdata->desc));
^~~~~~
drivers/regulator/pwm-regulator.c:335:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&drvdata->desc, &pwm_regulator_desc, sizeof(drvdata->desc));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/rk808-regulator.c:274:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_write(rdev->regmap, rdev->desc->vsel_reg, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/rk808-regulator.c:274:3: note: Value stored to 'ret' is never read
ret = regmap_write(rdev->regmap, rdev->desc->vsel_reg, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
include/linux/hid.h:1037:9: warning: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input') [clang-analyzer-core.NullDereference]
input->name, c, type);
^
drivers/hid/hid-icade.c:194:6: note: Assuming the condition is true
if ((usage->hid & HID_USAGE_PAGE) == HID_UP_KEYBOARD) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-icade.c:194:2: note: Taking true branch
if ((usage->hid & HID_USAGE_PAGE) == HID_UP_KEYBOARD) {
^
drivers/hid/hid-icade.c:197:8: note: 'trans' is non-null
if (!trans)
^~~~~
drivers/hid/hid-icade.c:197:3: note: Taking false branch
if (!trans)
^
drivers/hid/hid-icade.c:200:3: note: Calling 'hid_map_usage'
hid_map_usage(hi, usage, bit, max, EV_KEY, trans->to);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1008:2: note: 'input' initialized here
struct input_dev *input = hidinput->input;
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1012:2: note: Control jumps to 'case 1:' at line 1021
switch (type) {
^
include/linux/hid.h:1024:3: note: Execution continues on line 1035
break;
^
include/linux/hid.h:1035:15: note: Assuming 'c' is <= 'limit'
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:15: note: Left side of '||' is false
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1035:28: note: Assuming 'bmap' is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:2: note: Taking true branch
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1036:3: note: Assuming the condition is true
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/printk.h:639:6: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^~~~~~~~~~~~~~~~~
include/linux/ratelimit_types.h:41:28: note: expanded from macro '__ratelimit'
#define __ratelimit(state) ___ratelimit(state, __func__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1036:3: note: Taking true branch
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:639:2: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^
include/linux/hid.h:1036:3: note: Loop condition is false. Exiting loop
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
--
^~~~~~~
net/bridge/br_sysfs_if.c:239:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BRPORT_ATTR_FLAG(multicast_flood, BR_MCAST_FLOOD);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:239:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BRPORT_ATTR_FLAG(multicast_flood, BR_MCAST_FLOOD);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:240:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BRPORT_ATTR_FLAG(broadcast_flood, BR_BCAST_FLOOD);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:240:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BRPORT_ATTR_FLAG(broadcast_flood, BR_BCAST_FLOOD);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:241:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BRPORT_ATTR_FLAG(neigh_suppress, BR_NEIGH_SUPPRESS);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:241:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BRPORT_ATTR_FLAG(neigh_suppress, BR_NEIGH_SUPPRESS);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:242:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BRPORT_ATTR_FLAG(isolated, BR_ISOLATED);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
net/bridge/br_sysfs_if.c:242:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BRPORT_ATTR_FLAG(isolated, BR_ISOLATED);
^
net/bridge/br_sysfs_if.c:50:9: note: expanded from macro 'BRPORT_ATTR_FLAG'
return sprintf(buf, "%d\n", !!(p->flags & _mask)); \
^~~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/dma/qcom/hidma_ll.c:535:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lldev->tre_ring + lldev->tre_write_offset,
^~~~~~
drivers/dma/qcom/hidma_ll.c:535:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(lldev->tre_ring + lldev->tre_write_offset,
^~~~~~
drivers/dma/qcom/hidma_ll.c:817:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lldev->trepool, 0, required_bytes);
^~~~~~
drivers/dma/qcom/hidma_ll.c:817:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lldev->trepool, 0, required_bytes);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/dma/qcom/hidma.c:621:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n", mdev->chidx);
^~~~~~~
drivers/dma/qcom/hidma.c:621:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n", mdev->chidx);
^~~~~~~
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/dma/qcom/hidma_dbg.c:155:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(chan->dbg_name, "chan%d", chidx);
^~~~~~~
drivers/dma/qcom/hidma_dbg.c:155:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(chan->dbg_name, "chan%d", chidx);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
lib/xarray.c:2029:18: warning: Value stored to 'node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
lib/xarray.c:2029:18: note: Value stored to 'node' during its initialization is never read
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
>> drivers/bus/brcmstb_gisb.c:202:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d", timeout);
^~~~~~~
drivers/bus/brcmstb_gisb.c:202:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d", timeout);
^~~~~~~
>> drivers/bus/brcmstb_gisb.c:259:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(m_fmt, sizeof(m_fmt), "0x%08x", master);
^~~~~~~~
drivers/bus/brcmstb_gisb.c:259:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(m_fmt, sizeof(m_fmt), "0x%08x", master);
^~~~~~~~
drivers/bus/brcmstb_gisb.c:333:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(m_fmt, sizeof(m_fmt), "0x%08x", master);
^~~~~~~~
drivers/bus/brcmstb_gisb.c:333:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(m_fmt, sizeof(m_fmt), "0x%08x", master);
^~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/base/platform.c:578:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(pa->name, name);
^~~~~~
drivers/base/platform.c:578:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(pa->name, name);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/base/cpu.c:364:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
drivers/base/cpu.c:364:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
drivers/base/devres.c:120:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:120:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:921:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:921:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:955:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:955:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:1001:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1001:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1008:2: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1008:2: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1077:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, src, len);
^~~~~~
drivers/base/devres.c:1077:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, src, len);
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/xfs/libxfs/xfs_defer.c:787:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dres, &dfc->dfc_held, sizeof(struct xfs_defer_resources));
--
^
include/net/caif/caif_layer.h:31:3: note: expanded from macro 'caif_assert'
WARN_ON(!(assert)); \
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
net/caif/cfcnfg.c:407:2: note: Loop condition is false. Exiting loop
caif_assert(phyinfo->phy_layer != NULL);
^
include/net/caif/caif_layer.h:31:3: note: expanded from macro 'caif_assert'
WARN_ON(!(assert)); \
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:90:3: note: expanded from macro '__WARN_printf'
instrumentation_begin(); \
^
include/linux/instrumentation.h:57:34: note: expanded from macro 'instrumentation_begin'
# define instrumentation_begin() do { } while(0)
^
net/caif/cfcnfg.c:407:2: note: Loop condition is false. Exiting loop
caif_assert(phyinfo->phy_layer != NULL);
^
include/net/caif/caif_layer.h:31:3: note: expanded from macro 'caif_assert'
WARN_ON(!(assert)); \
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:92:3: note: expanded from macro '__WARN_printf'
instrumentation_end(); \
^
include/linux/instrumentation.h:58:33: note: expanded from macro 'instrumentation_end'
# define instrumentation_end() do { } while(0)
^
net/caif/cfcnfg.c:407:2: note: Loop condition is false. Exiting loop
caif_assert(phyinfo->phy_layer != NULL);
^
include/net/caif/caif_layer.h:31:3: note: expanded from macro 'caif_assert'
WARN_ON(!(assert)); \
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:89:38: note: expanded from macro '__WARN_printf'
#define __WARN_printf(taint, arg...) do { \
^
net/caif/cfcnfg.c:407:2: note: Loop condition is false. Exiting loop
caif_assert(phyinfo->phy_layer != NULL);
^
include/net/caif/caif_layer.h:27:33: note: expanded from macro 'caif_assert'
#define caif_assert(assert) \
^
net/caif/cfcnfg.c:408:14: note: Access to field 'id' results in a dereference of a null pointer (loaded from field 'phy_layer')
caif_assert(phyinfo->phy_layer->id == phyid);
^
include/net/caif/caif_layer.h:29:8: note: expanded from macro 'caif_assert'
if (!(assert)) { \
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/i2c/busses/i2c-designware-master.c:891:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(adap->name, sizeof(adap->name),
^~~~~~~~
drivers/i2c/busses/i2c-designware-master.c:891:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name),
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/i2c/busses/i2c-taos-evm.c:73:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "@%02X", addr);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:73:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "@%02X", addr);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:78:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(p, "$#%02X", command);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:78:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(p, "$#%02X", command);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:80:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(p, "$");
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:80:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(p, "$");
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:84:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(p, "$%02X#%02X", command, data->byte);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:84:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(p, "$%02X#%02X", command, data->byte);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:86:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(p, "$%02X", command);
^~~~~~~
drivers/i2c/busses/i2c-taos-evm.c:86:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(p, "$%02X", command);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
drivers/power/supply/power_supply_sysfs.c:251:13: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += sprintf(buf + count, "[%s] ",
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:251:13: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count += sprintf(buf + count, "[%s] ",
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:255:13: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += sprintf(buf + count, "%s ",
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:255:13: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count += sprintf(buf + count, "%s ",
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:299:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", ps_attr->text_values[value.intval]);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:299:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", ps_attr->text_values[value.intval]);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:308:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%s\n", value.strval);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:308:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%s\n", value.strval);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:311:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d\n", value.intval);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:311:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d\n", value.intval);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:415:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(power_supply_attrs[i].attr_name, "_err_%d", i);
^~~~~~~
drivers/power/supply/power_supply_sysfs.c:415:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(power_supply_attrs[i].attr_name, "_err_%d", i);
^~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
mm/vmscan.c:239:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new->map, (int)0xff, old_map_size);
^~~~~~
mm/vmscan.c:239:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new->map, (int)0xff, old_map_size);
^~~~~~
mm/vmscan.c:240:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)new->map + old_map_size, 0, map_size - old_map_size);
^~~~~~
mm/vmscan.c:240:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)new->map + old_map_size, 0, map_size - old_map_size);
^~~~~~
mm/vmscan.c:242:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new->nr_deferred, old->nr_deferred, old_defer_size);
^~~~~~
mm/vmscan.c:242:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new->nr_deferred, old->nr_deferred, old_defer_size);
^~~~~~
mm/vmscan.c:243:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)new->nr_deferred + old_defer_size, 0,
^~~~~~
mm/vmscan.c:243:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)new->nr_deferred + old_defer_size, 0,
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/host/core.c:3937:2: note: Taking false branch
if (!nvme_ns_head_multipath(ns->head))
^
drivers/nvme/host/core.c:3946:6: note: 'last_path' is false
if (last_path)
^~~~~~~~~
drivers/nvme/host/core.c:3946:2: note: Taking false branch
if (last_path)
^
drivers/nvme/host/core.c:3948:2: note: Calling 'nvme_put_ns'
nvme_put_ns(ns);
^~~~~~~~~~~~~~~
drivers/nvme/host/core.c:597:2: note: Calling 'kref_put'
kref_put(&ns->kref, nvme_free_ns);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:6: note: Assuming the condition is true
if (refcount_dec_and_test(&kref->refcount)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:2: note: Taking true branch
if (refcount_dec_and_test(&kref->refcount)) {
^
include/linux/kref.h:65:3: note: Calling 'nvme_free_ns'
release(kref);
^~~~~~~~~~~~~
drivers/nvme/host/core.c:587:2: note: Memory is released
kfree(ns);
^~~~~~~~~
include/linux/kref.h:65:3: note: Returning; memory was released
release(kref);
^~~~~~~~~~~~~
drivers/nvme/host/core.c:597:2: note: Returning; memory was released
kref_put(&ns->kref, nvme_free_ns);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/host/core.c:3948:2: note: Returning; memory was released via 1st parameter
nvme_put_ns(ns);
^~~~~~~~~~~~~~~
drivers/nvme/host/core.c:3956:3: note: Returning; memory was released via 1st parameter
nvme_ns_remove(ns);
^~~~~~~~~~~~~~~~~~
drivers/nvme/host/core.c:3957:3: note: Use of memory after it is freed
nvme_put_ns(ns);
^ ~~
drivers/nvme/host/core.c:4489:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
drivers/nvme/host/core.c:4489:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/misc/xilinx_sdfec.c:298:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&status, 0, sizeof(status));
^~~~~~
drivers/misc/xilinx_sdfec.c:298:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&status, 0, sizeof(status));
^~~~~~
drivers/misc/xilinx_sdfec.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
>> drivers/power/supply/apm_power.c:78:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bp, 0, sizeof(struct find_bat_param));
^~~~~~
drivers/power/supply/apm_power.c:78:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bp, 0, sizeof(struct find_bat_param));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
drivers/power/supply/88pm860x_battery.c:197:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = ((buf[4] >> 6) << 10) | ((buf[3] >> 6) << 8)
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/88pm860x_battery.c:197:3: note: Value stored to 'ret' is never read
ret = ((buf[4] >> 6) << 10) | ((buf[3] >> 6) << 8)
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/88pm860x_battery.c:315:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ccnt, 0, sizeof(*ccnt));
^~~~~~
drivers/power/supply/88pm860x_battery.c:315:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ccnt, 0, sizeof(*ccnt));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
Suppressed 21 warnings (21 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/dma-buf/dma-resv.c:525:34: warning: Access to field 'shared_count' results in a dereference of a null pointer (loaded from variable 'list') [clang-analyzer-core.NullDereference]
RCU_INIT_POINTER(list->shared[list->shared_count++], f);
^
include/linux/rcupdate.h:860:14: note: expanded from macro 'RCU_INIT_POINTER'
WRITE_ONCE(p, RCU_INITIALIZER(v)); \
^
include/asm-generic/rwonce.h:61:15: note: expanded from macro 'WRITE_ONCE'
__WRITE_ONCE(x, val); \
^
include/asm-generic/rwonce.h:55:27: note: expanded from macro '__WRITE_ONCE'
*(volatile typeof(x) *)&(x) = (val); \
^
drivers/dma-buf/dma-resv.c:494:2: note: Assuming 'debug_locks' is 0
dma_resv_assert_held(dst);
^
include/linux/dma-resv.h:271:35: note: expanded from macro 'dma_resv_assert_held'
#define dma_resv_assert_held(obj) lockdep_assert_held(&(obj)->lock.base)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/lockdep.h:310:15: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^~~~~~~~~~~
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/dma-buf/dma-resv.c:494:2: note: Left side of '&&' is false
dma_resv_assert_held(dst);
^
include/linux/dma-resv.h:271:35: note: expanded from macro 'dma_resv_assert_held'
#define dma_resv_assert_held(obj) lockdep_assert_held(&(obj)->lock.base)
^
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^
include/linux/lockdep.h:310:27: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^
drivers/dma-buf/dma-resv.c:494:2: note: Taking false branch
dma_resv_assert_held(dst);
^
include/linux/dma-resv.h:271:35: note: expanded from macro 'dma_resv_assert_held'
#define dma_resv_assert_held(obj) lockdep_assert_held(&(obj)->lock.base)
^
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^
include/linux/lockdep.h:310:7: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/dma-buf/dma-resv.c:494:2: note: Loop condition is false. Exiting loop
dma_resv_assert_held(dst);
^
include/linux/dma-resv.h:271:35: note: expanded from macro 'dma_resv_assert_held'
#define dma_resv_assert_held(obj) lockdep_assert_held(&(obj)->lock.base)
^
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^
include/linux/lockdep.h:310:2: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^
drivers/dma-buf/dma-resv.c:496:2: note: Null pointer value stored to 'list'
list = NULL;
^~~~~~~~~~~
drivers/dma-buf/dma-resv.c:499:2: note: Calling 'dma_resv_iter_begin'
dma_resv_iter_begin(&cursor, src, true);
--
^
drivers/gpio/gpiolib-of.c:1026:6: note: 'ret' is 0
if (ret)
^~~
drivers/gpio/gpiolib-of.c:1026:2: note: Taking false branch
if (ret)
^
drivers/gpio/gpiolib-of.c:1031:8: note: Calling 'of_gpiochip_scan_gpios'
ret = of_gpiochip_scan_gpios(chip);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:689:50: note: Assuming 'np' is not equal to null
for_each_available_child_of_node(chip->of_node, np) {
^
include/linux/of.h:1371:58: note: expanded from macro 'for_each_available_child_of_node'
for (child = of_get_next_available_child(parent, NULL); child != NULL; \
^~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:689:2: note: Loop condition is true. Entering loop body
for_each_available_child_of_node(chip->of_node, np) {
^
include/linux/of.h:1371:2: note: expanded from macro 'for_each_available_child_of_node'
for (child = of_get_next_available_child(parent, NULL); child != NULL; \
^
drivers/gpio/gpiolib-of.c:690:3: note: Taking false branch
if (!of_property_read_bool(np, "gpio-hog"))
^
drivers/gpio/gpiolib-of.c:693:9: note: Calling 'of_gpiochip_add_hog'
ret = of_gpiochip_add_hog(chip, np);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:655:2: note: 'name' declared without an initial value
const char *name;
^~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:659:2: note: Loop condition is true. Entering loop body
for (i = 0;; i++) {
^
drivers/gpio/gpiolib-of.c:660:10: note: Calling 'of_parse_own_gpio'
desc = of_parse_own_gpio(hog, chip, i, &name, &lflags, &dflags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:591:7: note: 'chip_np' is non-null
if (!chip_np)
^~~~~~~
drivers/gpio/gpiolib-of.c:591:2: note: Taking false branch
if (!chip_np)
^
drivers/gpio/gpiolib-of.c:599:6: note: 'ret' is not equal to 0
if (ret)
^~~
drivers/gpio/gpiolib-of.c:599:2: note: Taking true branch
if (ret)
^
drivers/gpio/gpiolib-of.c:600:3: note: Returning without writing to '*name'
return ERR_PTR(ret);
^
drivers/gpio/gpiolib-of.c:660:10: note: Returning from 'of_parse_own_gpio'
desc = of_parse_own_gpio(hog, chip, i, &name, &lflags, &dflags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:661:7: note: Calling 'IS_ERR'
if (IS_ERR(desc))
^~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:661:7: note: Returning from 'IS_ERR'
if (IS_ERR(desc))
^~~~~~~~~~~~
drivers/gpio/gpiolib-of.c:661:3: note: Taking false branch
if (IS_ERR(desc))
^
drivers/gpio/gpiolib-of.c:664:9: note: 2nd function call argument is an uninitialized value
ret = gpiod_hog(desc, name, lflags, dflags);
^ ~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/i2c/muxes/i2c-mux-mlxcpld.c:152:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data->pdata, pdata, sizeof(*pdata));
^~~~~~
drivers/i2c/muxes/i2c-mux-mlxcpld.c:152:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data->pdata, pdata, sizeof(*pdata));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
>> fs/hfs/dir.c:166:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rd->key, &fd.key->cat, sizeof(struct hfs_cat_key));
^~~~~~
fs/hfs/dir.c:166:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rd->key, &fd.key->cat, sizeof(struct hfs_cat_key));
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
>> fs/hfs/extent.c:464:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(HFS_I(inode)->cached_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/extent.c:464:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(HFS_I(inode)->cached_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> fs/affs/file.c:548:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + pos, AFFS_DATA(bh) + boff, tmp);
^~~~~~
fs/affs/file.c:548:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + pos, AFFS_DATA(bh) + boff, tmp);
^~~~~~
>> fs/affs/file.c:580:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(AFFS_DATA(bh) + boff, 0, tmp);
^~~~~~
fs/affs/file.c:580:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(AFFS_DATA(bh) + boff, 0, tmp);
^~~~~~
fs/affs/file.c:641:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_address(page) + to, 0, PAGE_SIZE - to);
^~~~~~
fs/affs/file.c:641:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_address(page) + to, 0, PAGE_SIZE - to);
^~~~~~
fs/affs/file.c:728:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(AFFS_DATA(bh) + boff, data + from, tmp);
^~~~~~
fs/affs/file.c:728:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(AFFS_DATA(bh) + boff, data + from, tmp);
^~~~~~
fs/affs/file.c:747:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(AFFS_DATA(bh), data + from, bsize);
^~~~~~
fs/affs/file.c:747:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(AFFS_DATA(bh), data + from, bsize);
^~~~~~
fs/affs/file.c:781:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(AFFS_DATA(bh), data + from, tmp);
^~~~~~
fs/affs/file.c:781:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(AFFS_DATA(bh), data + from, tmp);
^~~~~~
fs/affs/file.c:890:4: warning: Value stored to 'res' is never read [clang-analyzer-deadcode.DeadStores]
res = mapping->a_ops->write_end(NULL, mapping, isize, 0, 0, page, fsdata);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/affs/file.c:890:4: note: Value stored to 'res' is never read
res = mapping->a_ops->write_end(NULL, mapping, isize, 0, 0, page, fsdata);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
85 warnings generated.
net/ieee802154/header_ops.c:24:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + pos, &addr->pan_id, 2);
^~~~~~
net/ieee802154/header_ops.c:24:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + pos, &addr->pan_id, 2);
^~~~~~
net/ieee802154/header_ops.c:30:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + pos, &addr->short_addr, 2);
^~~~~~
net/ieee802154/header_ops.c:30:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + pos, &addr->short_addr, 2);
^~~~~~
net/ieee802154/header_ops.c:35:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + pos, &addr->extended_addr, IEEE802154_ADDR_LEN);
^~~~~~
net/ieee802154/header_ops.c:35:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + pos, &addr->extended_addr, IEEE802154_ADDR_LEN);
^~~~~~
net/ieee802154/header_ops.c:51:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, hdr, 1);
^~~~~~
net/ieee802154/header_ops.c:51:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, hdr, 1);
^~~~~~
net/ieee802154/header_ops.c:52:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 1, &hdr->frame_counter, 4);
^~~~~~
net/ieee802154/header_ops.c:52:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 1, &hdr->frame_counter, 4);
^~~~~~
net/ieee802154/header_ops.c:62:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + pos, &hdr->short_src, 4);
^~~~~~
net/ieee802154/header_ops.c:62:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + pos, &hdr->short_src, 4);
^~~~~~
net/ieee802154/header_ops.c:67:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + pos, &hdr->extended_src, IEEE802154_ADDR_LEN);
^~~~~~
net/ieee802154/header_ops.c:67:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + pos, &hdr->extended_src, IEEE802154_ADDR_LEN);
^~~~~~
net/ieee802154/header_ops.c:115:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, fc, 2);
^~~~~~
net/ieee802154/header_ops.c:115:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, fc, 2);
^~~~~~
net/ieee802154/header_ops.c:117:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_push(skb, pos), buf, pos);
^~~~~~
net/ieee802154/header_ops.c:117:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_push(skb, pos), buf, pos);
--
^~~~
drivers/soundwire/stream.c:1362:2: note: Taking false branch
if (!m_rt) {
^
drivers/soundwire/stream.c:1371:7: note: 's_rt' is non-null
if (!s_rt) {
^~~~
drivers/soundwire/stream.c:1371:2: note: Taking false branch
if (!s_rt) {
^
drivers/soundwire/stream.c:1380:6: note: 'ret' is 0
if (ret) {
^~~
drivers/soundwire/stream.c:1380:2: note: Taking false branch
if (ret) {
^
drivers/soundwire/stream.c:1394:6: note: 'ret' is -22
if (ret)
^~~
drivers/soundwire/stream.c:1394:2: note: Taking true branch
if (ret)
^
drivers/soundwire/stream.c:1395:3: note: Control jumps to line 1411
goto stream_error;
^
drivers/soundwire/stream.c:1411:2: note: Calling 'sdw_release_master_stream'
sdw_release_master_stream(m_rt, stream);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/soundwire/stream.c:1070:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(s_rt, _s_rt, &m_rt->slave_rt_list, m_rt_node) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/soundwire/stream.c:1072:3: note: Calling 'sdw_release_slave_stream'
sdw_release_slave_stream(s_rt->slave, stream);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/soundwire/stream.c:1041:2: note: Loop condition is true. Entering loop body
list_for_each_entry(m_rt, &stream->master_list, stream_node) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/soundwire/stream.c:1043:3: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(s_rt, _s_rt,
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/soundwire/stream.c:1045:8: note: Assuming 'slave' is equal to field 'slave'
if (s_rt->slave == slave) {
^~~~~~~~~~~~~~~~~~~~
drivers/soundwire/stream.c:1045:4: note: Taking true branch
if (s_rt->slave == slave) {
^
drivers/soundwire/stream.c:1047:5: note: Memory is released
kfree(s_rt);
^~~~~~~~~~~
drivers/soundwire/stream.c:1072:3: note: Returning; memory was released
sdw_release_slave_stream(s_rt->slave, stream);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/soundwire/stream.c:1070:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(s_rt, _s_rt, &m_rt->slave_rt_list, m_rt_node) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/soundwire/stream.c:1071:3: note: Calling 'sdw_slave_port_release'
sdw_slave_port_release(s_rt->slave->bus, s_rt->slave, stream);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/soundwire/stream.c:1013:2: note: Loop condition is true. Entering loop body
list_for_each_entry(m_rt, &stream->master_list, stream_node) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/soundwire/stream.c:1014:3: note: Loop condition is true. Entering loop body
list_for_each_entry(s_rt, &m_rt->slave_rt_list, m_rt_node) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/soundwire/stream.c:1015:8: note: Use of memory after it is freed
if (s_rt->slave != slave)
^~~~~~~~~~~
drivers/soundwire/stream.c:1506:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(¶ms, &bus->params, sizeof(params));
^~~~~~
drivers/soundwire/stream.c:1506:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(¶ms, &bus->params, sizeof(params));
^~~~~~
drivers/soundwire/stream.c:1569:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bus->params, ¶ms, sizeof(params));
^~~~~~
drivers/soundwire/stream.c:1569:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bus->params, ¶ms, sizeof(params));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/hfs/inode.c:231:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(HFS_I(inode)->first_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:231:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(HFS_I(inode)->first_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:232:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(HFS_I(inode)->cached_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:232:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(HFS_I(inode)->cached_extents, 0, sizeof(hfs_extent_rec));
^~~~~~
>> fs/hfs/inode.c:276:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(HFS_I(inode)->first_extents, ext, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:276:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(HFS_I(inode)->first_extents, ext, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:412:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ext, HFS_I(inode)->first_extents, sizeof(hfs_extent_rec));
^~~~~~
fs/hfs/inode.c:412:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ext, HFS_I(inode)->first_extents, sizeof(hfs_extent_rec));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/soundwire/sysfs_slave.c:79:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(mipi_revision, "0x%x\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:79:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(mipi_revision, "0x%x\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:80:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(wake_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:80:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(wake_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:81:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(test_mode_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:81:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(test_mode_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:82:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(clk_stop_mode1, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:82:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(clk_stop_mode1, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:83:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(simple_clk_stop_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:83:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(simple_clk_stop_capable, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:84:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(clk_stop_timeout, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:84:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(clk_stop_timeout, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:85:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(ch_prep_timeout, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:85:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(ch_prep_timeout, "%d\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:86:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_slave_attr(reset_behave, "%d\n");
--
^~~~~~~
drivers/soundwire/sysfs_slave.c:93:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_slave_attr(sink_ports, "0x%x\n");
^
drivers/soundwire/sysfs_slave.c:75:9: note: expanded from macro 'sdw_slave_attr'
return sprintf(buf, format_string, slave->prop.field); \
^~~~~~~
drivers/soundwire/sysfs_slave.c:152:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dp0_attr(max_word, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:152:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dp0_attr(max_word, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:153:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dp0_attr(min_word, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:153:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dp0_attr(min_word, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:154:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dp0_attr(BRA_flow_controlled, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:154:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dp0_attr(BRA_flow_controlled, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:155:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dp0_attr(simple_ch_prep_sm, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:155:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dp0_attr(simple_ch_prep_sm, "%d\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:156:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dp0_attr(imp_def_interrupts, "0x%x\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:156:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dp0_attr(imp_def_interrupts, "0x%x\n");
^
drivers/soundwire/sysfs_slave.c:148:9: note: expanded from macro 'sdw_dp0_attr'
return sprintf(buf, format_string, slave->prop.dp0_prop->field);\
^~~~~~~
drivers/soundwire/sysfs_slave.c:166:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size += sprintf(buf + size, "%d ",
^~~~~~~
drivers/soundwire/sysfs_slave.c:166:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size += sprintf(buf + size, "%d ",
^~~~~~~
drivers/soundwire/sysfs_slave.c:168:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size += sprintf(buf + size, "\n");
^~~~~~~
drivers/soundwire/sysfs_slave.c:168:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size += sprintf(buf + size, "\n");
^~~~~~~
drivers/soundwire/sysfs_slave.c:237:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", slave_status[slave->status]);
^~~~~~~
drivers/soundwire/sysfs_slave.c:237:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", slave_status[slave->status]);
^~~~~~~
drivers/soundwire/sysfs_slave.c:247:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s", "N/A");
^~~~~~~
drivers/soundwire/sysfs_slave.c:247:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s", "N/A");
^~~~~~~
drivers/soundwire/sysfs_slave.c:249:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d", slave->dev_num);
^~~~~~~
drivers/soundwire/sysfs_slave.c:249:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d", slave->dev_num);
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/mfd/asic3.c:555:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(alt_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
drivers/mfd/asic3.c:555:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(alt_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
drivers/mfd/asic3.c:556:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(out_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
drivers/mfd/asic3.c:556:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(out_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
drivers/mfd/asic3.c:557:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dir_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
drivers/mfd/asic3.c:557:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dir_reg, 0, ASIC3_NUM_GPIO_BANKS * sizeof(u16));
^~~~~~
>> drivers/mfd/asic3.c:1007:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(asic->clocks, asic3_clk_init, sizeof(asic3_clk_init));
^~~~~~
drivers/mfd/asic3.c:1007:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(asic->clocks, asic3_clk_init, sizeof(asic3_clk_init));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
block/blk-timeout.c:45:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", set != 0);
^~~~~~~
block/blk-timeout.c:45:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", set != 0);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
block/blk-mq.c:324:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rq, 0, sizeof(*rq));
^~~~~~
block/blk-mq.c:324:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rq, 0, sizeof(*rq));
^~~~~~
block/blk-mq.c:1286:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
list_for_each_entry_safe(rq, next, &rq_list, queuelist) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:2: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^ ~~~~~~~~~~~~~
block/blk-mq.c:1283:2: note: Calling 'list_splice_init'
list_splice_init(&q->requeue_list, &rq_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:490:6: note: Assuming the condition is false
if (!list_empty(list)) {
^~~~~~~~~~~~~~~~~
include/linux/list.h:490:2: note: Taking false branch
if (!list_empty(list)) {
^
block/blk-mq.c:1283:2: note: Returning from 'list_splice_init'
list_splice_init(&q->requeue_list, &rq_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/blk-mq.c:1286:2: note: Assigned value is garbage or undefined
list_for_each_entry_safe(rq, next, &rq_list, queuelist) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:2: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^ ~~~~~~~~~~~~~
block/blk-mq.c:2379:6: warning: Access to field 'queue' results in a dereference of a null pointer (loaded from variable 'hctx') [clang-analyzer-core.NullDereference]
if (hctx->queue->mq_ops->commit_rqs) {
^
block/blk-mq.c:2789:2: note: Taking false branch
if (unlikely(!blk_crypto_bio_prep(&bio)))
^
block/blk-mq.c:2793:2: note: Taking false branch
if (blk_may_split(q, bio))
^
block/blk-mq.c:2796:6: note: Assuming the condition is false
if (!bio_integrity_prep(bio))
^~~~~~~~~~~~~~~~~~~~~~~~
block/blk-mq.c:2796:2: note: Taking false branch
if (!bio_integrity_prep(bio))
^
block/blk-mq.c:2799:2: note: Taking false branch
if (blk_mq_attempt_bio_merge(q, bio, nr_segs))
^
block/blk-mq.c:2805:7: note: 'rq' is null
if (!rq) {
^~
block/blk-mq.c:2805:2: note: Taking true branch
if (!rq) {
^
block/blk-mq.c:2807:17: note: 'rq' is non-null
if (unlikely(!rq))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
--
^~~~~~
drivers/hid/hid-core.c:1906:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, hdev->rdesc + off, count);
^~~~~~
drivers/hid/hid-core.c:1917:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", hdev->country & 0xff);
^~~~~~~
drivers/hid/hid-core.c:1917:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", hdev->country & 0xff);
^~~~~~~
drivers/hid/hid-core.c:1979:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "input");
^~~~~~~
drivers/hid/hid-core.c:1979:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "input");
^~~~~~~
drivers/hid/hid-core.c:1981:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%shiddev%d", len ? "," : "",
^~~~~~~
drivers/hid/hid-core.c:1981:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%shiddev%d", len ? "," : "",
^~~~~~~
drivers/hid/hid-core.c:1984:3: warning: Value stored to 'len' is never read [clang-analyzer-deadcode.DeadStores]
len += sprintf(buf + len, "%shidraw%d", len ? "," : "",
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-core.c:1984:3: note: Value stored to 'len' is never read
len += sprintf(buf + len, "%shidraw%d", len ? "," : "",
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-core.c:1984:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%shidraw%d", len ? "," : "",
^~~~~~~
drivers/hid/hid-core.c:1984:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%shidraw%d", len ? "," : "",
^~~~~~~
drivers/hid/hid-core.c:2245:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%x %x %x %lx",
^~~~~~
drivers/hid/hid-core.c:2245:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%x %x %x %lx",
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/tty/tty_port.c:73:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port, 0, sizeof(*port));
^~~~~~
drivers/tty/tty_port.c:73:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port, 0, sizeof(*port));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/tty/pty.c:405:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tty->termios_locked, 0, sizeof(tty->termios_locked));
^~~~~~
drivers/tty/pty.c:405:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tty->termios_locked, 0, sizeof(tty->termios_locked));
^~~~~~
drivers/tty/pty.c:407:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&o_tty->termios_locked, 0, sizeof(tty->termios_locked));
^~~~~~
drivers/tty/pty.c:407:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&o_tty->termios_locked, 0, sizeof(tty->termios_locked));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/cpufreq/cpufreq_governor.c:52:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%u", &sampling_interval);
^~~~~~
drivers/cpufreq/cpufreq_governor.c:52:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%u", &sampling_interval);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
>> drivers/cpufreq/brcmstb-avs-cpufreq.c:658:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "<unknown>\n");
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:658:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "<unknown>\n");
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:660:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", pstate);
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:660:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", pstate);
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:669:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "<unknown>\n");
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:669:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "<unknown>\n");
^~~~~~~
>> drivers/cpufreq/brcmstb-avs-cpufreq.c:671:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s %u\n", brcm_avs_mode_to_string(pmap.mode),
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:671:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s %u\n", brcm_avs_mode_to_string(pmap.mode),
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:683:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "<unknown>\n");
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:683:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "<unknown>\n");
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:688:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x 0x%08x %u %u %u %u %u %u %u %u %u\n",
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:688:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x 0x%08x %u %u %u %u %u %u %u %u %u\n",
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:697:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", brcm_avs_get_voltage(priv->base));
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:697:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", brcm_avs_get_voltage(priv->base));
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:704:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", brcm_avs_get_frequency(priv->base));
^~~~~~~
drivers/cpufreq/brcmstb-avs-cpufreq.c:704:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", brcm_avs_get_frequency(priv->base));
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/input/ff-memless.c:335:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(combo_effect, 0, sizeof(struct ff_effect));
^~~~~~
drivers/input/ff-memless.c:335:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(combo_effect, 0, sizeof(struct ff_effect));
^~~~~~
drivers/input/ff-memless.c:395:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(handled_bm, 0, sizeof(handled_bm));
^~~~~~
drivers/input/ff-memless.c:395:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(handled_bm, 0, sizeof(handled_bm));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/input/mouse/elan_i2c_core.c:610:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%04x\n", data->fw_checksum);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:610:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%04x\n", data->fw_checksum);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:620:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, ETP_PRODUCT_ID_FORMAT_STRING "\n",
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:620:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, ETP_PRODUCT_ID_FORMAT_STRING "\n",
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:631:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.0\n", data->fw_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:631:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.0\n", data->fw_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:641:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.0\n", data->sm_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:641:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.0\n", data->sm_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:651:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.0\n", data->iap_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:651:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.0\n", data->iap_version);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:792:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", (int)mode);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:792:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", (int)mode);
^~~~~~~
drivers/input/mouse/elan_i2c_core.c:896:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
retval = snprintf(buf, PAGE_SIZE, "%d", data->min_baseline);
^~~~~~~~
drivers/input/mouse/elan_i2c_core.c:896:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
retval = snprintf(buf, PAGE_SIZE, "%d", data->min_baseline);
^~~~~~~~
drivers/input/mouse/elan_i2c_core.c:919:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
retval = snprintf(buf, PAGE_SIZE, "%d", data->max_baseline);
^~~~~~~~
drivers/input/mouse/elan_i2c_core.c:919:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
retval = snprintf(buf, PAGE_SIZE, "%d", data->max_baseline);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^
drivers/counter/counter-chrdev.c:549:2: note: Loop condition is false. Execution continues on line 555
list_for_each_entry(event_node, &counter->events_list, l)
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/counter/counter-chrdev.c:555:6: note: Assuming the condition is false
if (&event_node->l == &counter->events_list)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:555:2: note: Taking false branch
if (&event_node->l == &counter->events_list)
^
drivers/counter/counter-chrdev.c:559:2: note: Loop condition is true. Entering loop body
list_for_each_entry(comp_node, &event_node->comp_list, l) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/counter/counter-chrdev.c:561:16: note: Calling 'counter_get_data'
ev.status = -counter_get_data(counter, comp_node, &ev.value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:462:2: note: 'ret' declared without an initial value
int ret;
^~~~~~~
drivers/counter/counter-chrdev.c:464:6: note: Assuming field 'type' is not equal to COUNTER_COMPONENT_NONE
if (comp_node->component.type == COUNTER_COMPONENT_NONE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:464:2: note: Taking false branch
if (comp_node->component.type == COUNTER_COMPONENT_NONE)
^
drivers/counter/counter-chrdev.c:467:2: note: Control jumps to 'case COUNTER_COMP_BOOL:' at line 469
switch (comp->type) {
^
drivers/counter/counter-chrdev.c:470:3: note: 'Default' branch taken. Execution continues on line 481
switch (comp_node->component.scope) {
^
drivers/counter/counter-chrdev.c:482:3: note: Undefined or garbage value returned to caller
return ret;
^ ~~~
drivers/counter/counter-chrdev.c:501:3: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return ret;
^
drivers/counter/counter-chrdev.c:546:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&counter->events_list_lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/counter/counter-chrdev.c:546:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&counter->events_list_lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/counter/counter-chrdev.c:549:2: note: Loop condition is false. Execution continues on line 555
list_for_each_entry(event_node, &counter->events_list, l)
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/counter/counter-chrdev.c:555:6: note: Assuming the condition is false
if (&event_node->l == &counter->events_list)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:555:2: note: Taking false branch
if (&event_node->l == &counter->events_list)
^
drivers/counter/counter-chrdev.c:559:2: note: Loop condition is true. Entering loop body
list_for_each_entry(comp_node, &event_node->comp_list, l) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/counter/counter-chrdev.c:561:16: note: Calling 'counter_get_data'
ev.status = -counter_get_data(counter, comp_node, &ev.value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:462:2: note: 'ret' declared without an initial value
int ret;
^~~~~~~
drivers/counter/counter-chrdev.c:464:6: note: Assuming field 'type' is not equal to COUNTER_COMPONENT_NONE
if (comp_node->component.type == COUNTER_COMPONENT_NONE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/counter/counter-chrdev.c:464:2: note: Taking false branch
if (comp_node->component.type == COUNTER_COMPONENT_NONE)
^
drivers/counter/counter-chrdev.c:467:2: note: Control jumps to 'case COUNTER_COMP_COUNT_MODE:' at line 487
switch (comp->type) {
^
drivers/counter/counter-chrdev.c:488:3: note: 'Default' branch taken. Execution continues on line 500
switch (comp_node->component.scope) {
^
drivers/counter/counter-chrdev.c:501:3: note: Undefined or garbage value returned to caller
return ret;
^ ~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> fs/hfs/attr.c:47:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&file->UsrWds.fdType, value, 4);
^~~~~~
fs/hfs/attr.c:47:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&file->UsrWds.fdType, value, 4);
^~~~~~
fs/hfs/attr.c:54:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&file->UsrWds.fdCreator, value, 4);
^~~~~~
fs/hfs/attr.c:54:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&file->UsrWds.fdCreator, value, 4);
^~~~~~
fs/hfs/attr.c:95:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value, &file->UsrWds.fdType, 4);
^~~~~~
fs/hfs/attr.c:95:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value, &file->UsrWds.fdType, 4);
^~~~~~
fs/hfs/attr.c:103:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value, &file->UsrWds.fdCreator, 4);
^~~~~~
fs/hfs/attr.c:103:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value, &file->UsrWds.fdCreator, 4);
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> drivers/input/mouse/elan_i2c_i2c.c:642:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&page_store[2], page, fw_page_size);
^~~~~~
drivers/input/mouse/elan_i2c_i2c.c:642:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&page_store[2], page, fw_page_size);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/input/mouse/elan_i2c_smbus.c:127:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(val, buf, ETP_CALIBRATE_MAX_LEN);
^~~~~~
drivers/input/mouse/elan_i2c_smbus.c:127:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(val, buf, ETP_CALIBRATE_MAX_LEN);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/video/backlight/sky81452-backlight.c:128:5: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(tmp, "%d ", i + 1);
^~~~~~~
drivers/video/backlight/sky81452-backlight.c:128:5: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(tmp, "%d ", i + 1);
^~~~~~~
drivers/video/backlight/sky81452-backlight.c:129:5: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, tmp);
^~~~~~
drivers/video/backlight/sky81452-backlight.c:129:5: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, tmp);
^~~~~~
drivers/video/backlight/sky81452-backlight.c:133:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:133:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:135:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buf, "none\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:135:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf, "none\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:155:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "over-current ");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:155:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "over-current ");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:158:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "over-temperature");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:158:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "over-temperature");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:160:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, "\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:160:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, "\n");
^~~~~~
drivers/video/backlight/sky81452-backlight.c:293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&props, 0, sizeof(props));
^~~~~~
drivers/video/backlight/sky81452-backlight.c:293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&props, 0, sizeof(props));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
net/phonet/socket.c:207:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sa, 0, sizeof(sa));
^~~~~~
net/phonet/socket.c:207:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sa, 0, sizeof(sa));
^~~~~~
net/phonet/socket.c:321:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, sizeof(struct sockaddr_pn));
^~~~~~
net/phonet/socket.c:321:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, sizeof(struct sockaddr_pn));
^~~~~~
net/phonet/socket.c:478:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&try_sa, 0, sizeof(struct sockaddr_pn));
^~~~~~
net/phonet/socket.c:478:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&try_sa, 0, sizeof(struct sockaddr_pn));
^~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
net/phonet/datagram.c:148:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->msg_name, &sa, sizeof(sa));
^~~~~~
net/phonet/datagram.c:148:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->msg_name, &sa, sizeof(sa));
--
^
fs/netfs/read_helper.c:355:2: note: Calling 'netfs_rreq_do_write_to_cache'
netfs_rreq_do_write_to_cache(rreq);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:308:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(subreq, p, &rreq->subrequests, rreq_link) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
fs/netfs/read_helper.c:309:7: note: Assuming the condition is true
if (!test_bit(NETFS_SREQ_WRITE_TO_CACHE, &subreq->flags)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:309:3: note: Taking true branch
if (!test_bit(NETFS_SREQ_WRITE_TO_CACHE, &subreq->flags)) {
^
fs/netfs/read_helper.c:311:4: note: Calling 'netfs_put_subrequest'
netfs_put_subrequest(subreq, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:36:2: note: Taking true branch
if (refcount_dec_and_test(&subreq->usage))
^
fs/netfs/read_helper.c:37:3: note: Calling '__netfs_put_subrequest'
__netfs_put_subrequest(subreq, was_async);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:142:2: note: Memory is released
kfree(subreq);
^~~~~~~~~~~~~
fs/netfs/read_helper.c:143:2: note: Loop condition is false. Exiting loop
netfs_stat_d(&netfs_n_rh_sreq);
^
fs/netfs/internal.h:55:25: note: expanded from macro 'netfs_stat_d'
#define netfs_stat_d(x) do {} while(0)
^
fs/netfs/read_helper.c:37:3: note: Returning; memory was released
__netfs_put_subrequest(subreq, was_async);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:311:4: note: Returning; memory was released
netfs_put_subrequest(subreq, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/netfs/read_helper.c:308:2: note: Loop condition is false. Execution continues on line 315
list_for_each_entry_safe(subreq, p, &rreq->subrequests, rreq_link) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
fs/netfs/read_helper.c:315:2: note: Loop condition is true. Entering loop body
list_for_each_entry(subreq, &rreq->subrequests, rreq_link) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
fs/netfs/read_helper.c:317:11: note: Calling 'list_is_last'
while (!list_is_last(&subreq->rreq_link, &rreq->subrequests)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:273:9: note: Use of memory after it is freed
return list->next == head;
^~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/tty/serial/8250/8250_core.c:801:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&uart, 0, sizeof(uart));
^~~~~~
drivers/tty/serial/8250/8250_core.c:801:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&uart, 0, sizeof(uart));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/tty/serial/8250/8250_port.c:687:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
drivers/tty/serial/8250/8250_port.c:687:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
170 warnings generated.
Suppressed 170 warnings (167 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
Suppressed 81 warnings (80 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
>> net/core/netprio_cgroup.c:74:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new->priomap, old->priomap,
^~~~~~
net/core/netprio_cgroup.c:74:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new->priomap, old->priomap,
^~~~~~
>> net/core/netprio_cgroup.c:203:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%"__stringify(IFNAMSIZ)"s %u", devname, &prio) != 2)
^~~~~~
net/core/netprio_cgroup.c:203:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%"__stringify(IFNAMSIZ)"s %u", devname, &prio) != 2)
^~~~~~
Suppressed 73 warnings (73 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
Suppressed 81 warnings (80 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
net/core/failover.c:66:46: warning: Access to field 'slave_handle_frame' results in a dereference of a null pointer (loaded from variable 'fops') [clang-analyzer-core.NullDereference]
err = netdev_rx_handler_register(slave_dev, fops->slave_handle_frame,
^
net/core/failover.c:247:6: note: Assuming field 'type' is equal to ARPHRD_ETHER
if (dev->type != ARPHRD_ETHER)
^~~~~~~~~~~~~~~~~~~~~~~~~
net/core/failover.c:247:2: note: Taking false branch
if (dev->type != ARPHRD_ETHER)
^
net/core/failover.c:251:6: note: Assuming 'failover' is non-null
if (!failover)
^~~~~~~~~
net/core/failover.c:251:2: note: Taking false branch
if (!failover)
^
net/core/failover.c:254:2: note: Left side of '&&' is false
rcu_assign_pointer(failover->ops, ops);
^
include/linux/rcupdate.h:452:30: note: expanded from macro 'rcu_assign_pointer'
if (__builtin_constant_p(v) && (_r_a_p__v) == (uintptr_t)NULL) \
^
net/core/failover.c:254:2: note: Left side of '||' is false
rcu_assign_pointer(failover->ops, ops);
^
include/linux/rcupdate.h:455:3: note: expanded from macro 'rcu_assign_pointer'
smp_store_release(&p, RCU_INITIALIZER((typeof(p))_r_a_p__v)); \
^
include/asm-generic/barrier.h:188:2: note: expanded from macro 'smp_store_release'
compiletime_assert_atomic_type(*p); \
^
include/linux/compiler_types.h:349:21: note: expanded from macro 'compiletime_assert_atomic_type'
compiletime_assert(__native_word(t), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/core/failover.c:254:2: note: Left side of '||' is false
rcu_assign_pointer(failover->ops, ops);
^
include/linux/rcupdate.h:455:3: note: expanded from macro 'rcu_assign_pointer'
smp_store_release(&p, RCU_INITIALIZER((typeof(p))_r_a_p__v)); \
^
include/asm-generic/barrier.h:188:2: note: expanded from macro 'smp_store_release'
compiletime_assert_atomic_type(*p); \
^
include/linux/compiler_types.h:349:21: note: expanded from macro 'compiletime_assert_atomic_type'
compiletime_assert(__native_word(t), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/core/failover.c:254:2: note: Left side of '||' is true
rcu_assign_pointer(failover->ops, ops);
^
include/linux/rcupdate.h:455:3: note: expanded from macro 'rcu_assign_pointer'
smp_store_release(&p, RCU_INITIALIZER((typeof(p))_r_a_p__v)); \
^
include/asm-generic/barrier.h:188:2: note: expanded from macro 'smp_store_release'
compiletime_assert_atomic_type(*p); \
^
include/linux/compiler_types.h:349:21: note: expanded from macro 'compiletime_assert_atomic_type'
compiletime_assert(__native_word(t), \
^
include/linux/compiler_types.h:314:28: note: expanded from macro '__native_word'
sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
^
net/core/failover.c:254:2: note: Taking false branch
rcu_assign_pointer(failover->ops, ops);
^
include/linux/rcupdate.h:455:3: note: expanded from macro 'rcu_assign_pointer'
smp_store_release(&p, RCU_INITIALIZER((typeof(p))_r_a_p__v)); \
^
include/asm-generic/barrier.h:188:2: note: expanded from macro 'smp_store_release'
compiletime_assert_atomic_type(*p); \
^
include/linux/compiler_types.h:349:2: note: expanded from macro 'compiletime_assert_atomic_type'
compiletime_assert(__native_word(t), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
net/core/failover.c:254:2: note: Loop condition is false. Exiting loop
rcu_assign_pointer(failover->ops, ops);
--
90 warnings generated.
net/bridge/br_device.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
^~~~~~
net/bridge/br_device.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
^~~~~~
Suppressed 89 warnings (83 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
89 warnings generated.
net/bridge/br_fdb.c:217:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
^~~~~~
net/bridge/br_fdb.c:217:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
^~~~~~
net/bridge/br_fdb.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:647:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
^~~~~~
net/bridge/br_fdb.c:647:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
^~~~~~
net/bridge/br_fdb.c:667:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fe->mac_addr, f->key.addr.addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:667:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fe->mac_addr, f->key.addr.addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:1045:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nfea_tb, 0, sizeof(struct nlattr *) * (NFEA_MAX + 1));
^~~~~~
net/bridge/br_fdb.c:1045:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(nfea_tb, 0, sizeof(struct nlattr *) * (NFEA_MAX + 1));
^~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
net/802/mrp.c:282:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(attr->value, value, len);
^~~~~~
net/802/mrp.c:282:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(attr->value, value, len);
^~~~~~
net/802/mrp.c:397:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vah->firstattrvalue, firstattrvalue, attrlen);
^~~~~~
net/802/mrp.c:397:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vah->firstattrvalue, firstattrvalue, attrlen);
^~~~~~
net/802/mrp.c:399:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mrp_cb(app->pdu)->attrvalue, firstattrvalue, attrlen);
^~~~~~
net/802/mrp.c:399:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mrp_cb(app->pdu)->attrvalue, firstattrvalue, attrlen);
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
Suppressed 7 warnings (7 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/target/target_core_rd.c:163:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, init_payload, PAGE_SIZE);
^~~~~~
drivers/target/target_core_rd.c:163:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, init_payload, PAGE_SIZE);
^~~~~~
drivers/target/target_core_rd.c:487:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m.addr, rd_addr, len);
^~~~~~
drivers/target/target_core_rd.c:487:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m.addr, rd_addr, len);
^~~~~~
drivers/target/target_core_rd.c:489:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rd_addr, m.addr, len);
^~~~~~
drivers/target/target_core_rd.c:489:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rd_addr, m.addr, len);
^~~~~~
drivers/target/target_core_rd.c:599:15: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ssize_t bl = sprintf(b, "TCM RamDisk ID: %u RamDisk Makeup: rd_mcp\n",
^~~~~~~
drivers/target/target_core_rd.c:599:15: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ssize_t bl = sprintf(b, "TCM RamDisk ID: %u RamDisk Makeup: rd_mcp\n",
^~~~~~~
drivers/target/target_core_rd.c:601:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
bl += sprintf(b + bl, " PAGES/PAGE_SIZE: %u*%lu"
^~~~~~~
drivers/target/target_core_rd.c:601:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
bl += sprintf(b + bl, " PAGES/PAGE_SIZE: %u*%lu"
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
90 warnings generated.
>> net/bridge/br_vlan.c:1310:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
net/bridge/br_vlan.c:1310:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
net/bridge/br_vlan.c:1751:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
net/bridge/br_vlan.c:1751:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
net/bridge/br_vlan.c:1829:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bvm, 0, sizeof(*bvm));
^~~~~~
net/bridge/br_vlan.c:1829:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bvm, 0, sizeof(*bvm));
^~~~~~
net/bridge/br_vlan.c:1905:3: warning: Value stored to 'br' is never read [clang-analyzer-deadcode.DeadStores]
br = p->br;
^ ~~~~~
net/bridge/br_vlan.c:1905:3: note: Value stored to 'br' is never read
br = p->br;
^ ~~~~~
net/bridge/br_vlan.c:1916:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bvm, 0, sizeof(*bvm));
^~~~~~
net/bridge/br_vlan.c:1916:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bvm, 0, sizeof(*bvm));
^~~~~~
net/bridge/br_vlan.c:2093:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&vrange_end, 0, sizeof(vrange_end));
^~~~~~
net/bridge/br_vlan.c:2093:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&vrange_end, 0, sizeof(vrange_end));
^~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
net/caif/cfpkt_skbuff.c:112:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, skb->data, len);
^~~~~~
net/caif/cfpkt_skbuff.c:112:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, skb->data, len);
^~~~~~
net/caif/cfpkt_skbuff.c:140:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, from, len);
^~~~~~
net/caif/cfpkt_skbuff.c:140:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, from, len);
^~~~~~
net/caif/cfpkt_skbuff.c:163:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, from, len);
^~~~~~
net/caif/cfpkt_skbuff.c:163:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, from, len);
^~~~~~
net/caif/cfpkt_skbuff.c:206:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(to, data, len);
^~~~~~
net/caif/cfpkt_skbuff.c:206:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(to, data, len);
^~~~~~
net/caif/cfpkt_skbuff.c:237:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(to, data, len);
^~~~~~
net/caif/cfpkt_skbuff.c:237:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(to, data, len);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/tty/serial/8250/8250_aspeed_vuart.c:85:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 1, "0x%x\n", addr);
^~~~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:85:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 1, "0x%x\n", addr);
^~~~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:127:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 1, "%u\n", reg);
^~~~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:127:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 1, "%u\n", reg);
^~~~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:174:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 1, "%u\n", reg ? 1 : 0);
^~~~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:174:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 1, "%u\n", reg ? 1 : 0);
^~~~~~~~
>> drivers/tty/serial/8250/8250_aspeed_vuart.c:433:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port, 0, sizeof(port));
^~~~~~
drivers/tty/serial/8250/8250_aspeed_vuart.c:433:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port, 0, sizeof(port));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
crypto/essiv.c:213:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, req->iv, ivsize);
^~~~~~
crypto/essiv.c:213:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv, req->iv, ivsize);
^~~~~~
crypto/essiv.c:403:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(essiv_cipher_name, p, len);
^~~~~~
crypto/essiv.c:403:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(essiv_cipher_name, p, len);
^~~~~~
crypto/essiv.c:552:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(base->cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/essiv.c:552:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(base->cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/essiv.c:556:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(base->cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/essiv.c:556:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(base->cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
drivers/target/target_core_stat.c:52:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", hba->hba_index);
^~~~~~~~
drivers/target/target_core_stat.c:52:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", hba->hba_index);
^~~~~~~~
drivers/target/target_core_stat.c:57:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_dev(item)->dev_index);
^~~~~~~~
drivers/target/target_core_stat.c:57:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_dev(item)->dev_index);
^~~~~~~~
drivers/target/target_core_stat.c:62:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "Target\n");
^~~~~~~~
drivers/target/target_core_stat.c:62:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "Target\n");
^~~~~~~~
drivers/target/target_core_stat.c:67:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_dev(item)->export_count);
^~~~~~~~
drivers/target/target_core_stat.c:67:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_dev(item)->export_count);
^~~~~~~~
drivers/target/target_core_stat.c:102:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", hba->hba_index);
^~~~~~~~
drivers/target/target_core_stat.c:102:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", hba->hba_index);
^~~~~~~~
drivers/target/target_core_stat.c:107:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_tgt_dev(item)->dev_index);
^~~~~~~~
drivers/target/target_core_stat.c:107:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", to_stat_tgt_dev(item)->dev_index);
^~~~~~~~
drivers/target/target_core_stat.c:113:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", LU_COUNT);
^~~~~~~~
drivers/target/target_core_stat.c:113:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", LU_COUNT);
^~~~~~~~
drivers/target/target_core_stat.c:120:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "activated");
^~~~~~~~
drivers/target/target_core_stat.c:120:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "activated");
^~~~~~~~
drivers/target/target_core_stat.c:122:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "deactivated");
^~~~~~~~
drivers/target/target_core_stat.c:122:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "deactivated");
^~~~~~~~
drivers/target/target_core_stat.c:135:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%u\n", non_accessible_lus);
^~~~~~~~
drivers/target/target_core_stat.c:135:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%u\n", non_accessible_lus);
^~~~~~~~
drivers/target/target_core_stat.c:141:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%lu\n",
^~~~~~~~
drivers/target/target_core_stat.c:141:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%lu\n",
--
^~~~~
fs/jffs2/nodelist.c:665:2: note: Taking false branch
if (!size)
^
fs/jffs2/nodelist.c:667:15: note: Assuming 'size' is <= field 'free_size'
if (unlikely(size > jeb->free_size)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:667:2: note: Taking false branch
if (unlikely(size > jeb->free_size)) {
^
fs/jffs2/nodelist.c:673:6: note: Assuming field 'last_node' is null
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^~~~~~~~~~~~~~
fs/jffs2/nodelist.c:673:21: note: Left side of '&&' is false
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^
fs/jffs2/nodelist.c:685:3: note: Calling 'jffs2_link_node_ref'
jffs2_link_node_ref(c, jeb, ofs, size, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:592:9: note: Assuming field 'allocated_refs' is not equal to 0
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:65:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:592:2: note: Taking false branch
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:592:2: note: Loop condition is false. Exiting loop
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:595:2: note: Null pointer value stored to 'ref'
ref = jeb->last_node;
^~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:597:2: note: Taking false branch
dbg_noderef("Last node at %p is (%08x,%p)\n", ref, ref->flash_offset,
^
fs/jffs2/debug.h:134:31: note: expanded from macro 'dbg_noderef'
#define dbg_noderef(fmt, ...) no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/jffs2/nodelist.c:600:9: note: Access to field 'flash_offset' results in a dereference of a null pointer (loaded from variable 'ref')
while (ref->flash_offset != REF_EMPTY_NODE) {
^~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/jffs2/read.c:80:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, len);
^~~~~~
fs/jffs2/read.c:80:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, len);
^~~~~~
fs/jffs2/read.c:143:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:143:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:187:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:187:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:196:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:196:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:217:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, readlen);
^~~~~~
fs/jffs2/read.c:217:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, readlen);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
>> kernel/trace/preemptirq_delay_test.c:154:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(task_name, sizeof(task_name), "%s_test", test_mode);
^~~~~~~~
kernel/trace/preemptirq_delay_test.c:154:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(task_name, sizeof(task_name), "%s_test", test_mode);
^~~~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
kernel/trace/synth_event_gen_test.c:362:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = synth_event_add_next_val(395, &trace_state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/synth_event_gen_test.c:362:2: note: Value stored to 'ret' is never read
ret = synth_event_add_next_val(395, &trace_state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/synth_event_gen_test.c:413:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = synth_event_add_val("my_int_field", 3999, &trace_state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/synth_event_gen_test.c:413:2: note: Value stored to 'ret' is never read
ret = synth_event_add_val("my_int_field", 3999, &trace_state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
include/linux/list.h:72:13: warning: Access to field 'prev' results in a dereference of a null pointer (loaded from variable 'next') [clang-analyzer-core.NullDereference]
next->prev = new;
^
mm/zsmalloc.c:2152:16: note: Calling 'zs_compact'
pages_freed = zs_compact(pool);
^~~~~~~~~~~~~~~~
mm/zsmalloc.c:2120:11: note: '?' condition is true
for (i = ZS_SIZE_CLASSES - 1; i >= 0; i--) {
^
mm/zsmalloc.c:151:59: note: expanded from macro 'ZS_SIZE_CLASSES'
#define ZS_SIZE_CLASSES (DIV_ROUND_UP(ZS_MAX_ALLOC_SIZE - ZS_MIN_ALLOC_SIZE, \
^
mm/zsmalloc.c:133:2: note: expanded from macro 'ZS_MIN_ALLOC_SIZE'
MAX(32, (ZS_MAX_PAGES_PER_ZSPAGE << PAGE_SHIFT >> OBJ_INDEX_BITS))
^
mm/zsmalloc.c:130:20: note: expanded from macro 'MAX'
#define MAX(a, b) ((a) >= (b) ? (a) : (b))
^
mm/zsmalloc.c:2120:2: note: Loop condition is true. Entering loop body
for (i = ZS_SIZE_CLASSES - 1; i >= 0; i--) {
^
mm/zsmalloc.c:2122:7: note: Assuming 'class' is non-null
if (!class)
^~~~~~
mm/zsmalloc.c:2122:3: note: Taking false branch
if (!class)
^
mm/zsmalloc.c:2124:7: note: Assuming 'i' is equal to field 'index'
if (class->index != i)
^~~~~~~~~~~~~~~~~
mm/zsmalloc.c:2124:3: note: Taking false branch
if (class->index != i)
^
mm/zsmalloc.c:2126:18: note: Calling '__zs_compact'
pages_freed += __zs_compact(pool, class);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/zsmalloc.c:2054:2: note: Calling 'spin_lock'
spin_lock(&class->lock);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/spinlock.h:349:2: note: Value assigned to field 'next'
raw_spin_lock(&lock->rlock);
^
include/linux/spinlock.h:215:29: note: expanded from macro 'raw_spin_lock'
#define raw_spin_lock(lock) _raw_spin_lock(lock)
^~~~~~~~~~~~~~~~~~~~
mm/zsmalloc.c:2054:2: note: Returning from 'spin_lock'
spin_lock(&class->lock);
^~~~~~~~~~~~~~~~~~~~~~~
mm/zsmalloc.c:2055:2: note: Loop condition is true. Entering loop body
while ((src_zspage = isolate_zspage(class, true))) {
^
mm/zsmalloc.c:2059:7: note: Assuming the condition is true
if (!zs_can_compact(class))
^~~~~~~~~~~~~~~~~~~~~~
mm/zsmalloc.c:2059:3: note: Taking true branch
if (!zs_can_compact(class))
^
mm/zsmalloc.c:2060:4: note: Execution continues on line 2103
break;
^
mm/zsmalloc.c:2103:6: note: 'src_zspage' is non-null
if (src_zspage) {
^~~~~~~~~~
mm/zsmalloc.c:2103:2: note: Taking true branch
if (src_zspage) {
^
mm/zsmalloc.c:2104:3: note: Calling 'putback_zspage'
putback_zspage(class, src_zspage);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/zsmalloc.c:1708:2: note: Calling 'insert_zspage'
insert_zspage(class, zspage, fullness);
--
^
drivers/gpio/gpiolib-cdev.c:202:13: note: Left side of '&&' is true
if (cmd == GPIOHANDLE_GET_LINE_VALUES_IOCTL) {
^
include/uapi/linux/gpio.h:523:42: note: expanded from macro 'GPIOHANDLE_GET_LINE_VALUES_IOCTL'
#define GPIOHANDLE_GET_LINE_VALUES_IOCTL _IOWR(0xB4, 0x08, struct gpiohandle_data)
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:4: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
drivers/gpio/gpiolib-cdev.c:202:13: note: '?' condition is true
if (cmd == GPIOHANDLE_GET_LINE_VALUES_IOCTL) {
^
include/uapi/linux/gpio.h:523:42: note: expanded from macro 'GPIOHANDLE_GET_LINE_VALUES_IOCTL'
#define GPIOHANDLE_GET_LINE_VALUES_IOCTL _IOWR(0xB4, 0x08, struct gpiohandle_data)
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:3: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
drivers/gpio/gpiolib-cdev.c:202:6: note: Assuming the condition is false
if (cmd == GPIOHANDLE_GET_LINE_VALUES_IOCTL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-cdev.c:202:2: note: Taking false branch
if (cmd == GPIOHANDLE_GET_LINE_VALUES_IOCTL) {
^
drivers/gpio/gpiolib-cdev.c:221:20: note: Left side of '&&' is true
} else if (cmd == GPIOHANDLE_SET_LINE_VALUES_IOCTL) {
^
include/uapi/linux/gpio.h:524:42: note: expanded from macro 'GPIOHANDLE_SET_LINE_VALUES_IOCTL'
#define GPIOHANDLE_SET_LINE_VALUES_IOCTL _IOWR(0xB4, 0x09, struct gpiohandle_data)
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:4: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
drivers/gpio/gpiolib-cdev.c:221:20: note: '?' condition is true
} else if (cmd == GPIOHANDLE_SET_LINE_VALUES_IOCTL) {
^
include/uapi/linux/gpio.h:524:42: note: expanded from macro 'GPIOHANDLE_SET_LINE_VALUES_IOCTL'
#define GPIOHANDLE_SET_LINE_VALUES_IOCTL _IOWR(0xB4, 0x09, struct gpiohandle_data)
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:3: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
drivers/gpio/gpiolib-cdev.c:221:13: note: Assuming the condition is true
} else if (cmd == GPIOHANDLE_SET_LINE_VALUES_IOCTL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-cdev.c:221:9: note: Taking true branch
} else if (cmd == GPIOHANDLE_SET_LINE_VALUES_IOCTL) {
^
drivers/gpio/gpiolib-cdev.c:226:7: note: Assuming the condition is false
if (!test_bit(FLAG_IS_OUT, &lh->descs[0]->flags))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-cdev.c:226:3: note: Taking false branch
if (!test_bit(FLAG_IS_OUT, &lh->descs[0]->flags))
^
drivers/gpio/gpiolib-cdev.c:229:3: note: Taking false branch
if (copy_from_user(&ghd, ip, sizeof(ghd)))
^
drivers/gpio/gpiolib-cdev.c:233:15: note: Assuming 'i' is < field 'num_descs'
for (i = 0; i < lh->num_descs; i++)
^~~~~~~~~~~~~~~~~
drivers/gpio/gpiolib-cdev.c:233:3: note: Loop condition is true. Entering loop body
for (i = 0; i < lh->num_descs; i++)
^
drivers/gpio/gpiolib-cdev.c:234:4: note: Calling '__assign_bit'
__assign_bit(i, vals, ghd.values[i]);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:217:6: note: Assuming 'value' is false
if (value)
^~~~~
include/linux/bitops.h:217:2: note: Taking false branch
if (value)
^
include/linux/bitops.h:220:3: note: Calling 'arch___clear_bit'
__clear_bit(nr, addr);
^
include/asm-generic/bitops/non-atomic.h:34:21: note: expanded from macro '__clear_bit'
#define __clear_bit arch___clear_bit
^
include/asm-generic/bitops/non-atomic.h:32:5: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
*p &= ~mask;
~~ ^
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> fs/affs/amigaffs.c:185:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(AFFS_TAIL(sb, bh)->name, AFFS_TAIL(sb, link_bh)->name, 32);
^~~~~~
fs/affs/amigaffs.c:185:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(AFFS_TAIL(sb, bh)->name, AFFS_TAIL(sb, link_bh)->name, 32);
^~~~~~
fs/affs/amigaffs.c:541:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bstr, dentry->d_name.name, len);
^~~~~~
fs/affs/amigaffs.c:541:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bstr, dentry->d_name.name, len);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/fuse/dev.c:667:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cs, 0, sizeof(*cs));
^~~~~~
fs/fuse/dev.c:667:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cs, 0, sizeof(*cs));
^~~~~~
fs/fuse/dev.c:763:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, *val, ncpy);
^~~~~~
fs/fuse/dev.c:763:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, *val, ncpy);
^~~~~~
fs/fuse/dev.c:765:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(*val, buf, ncpy);
^~~~~~
fs/fuse/dev.c:765:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(*val, buf, ncpy);
^~~~~~
fs/fuse/dev.c:1055:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ih, 0, sizeof(ih));
^~~~~~
fs/fuse/dev.c:1055:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ih, 0, sizeof(ih));
^~~~~~
fs/fuse/dev.c:1056:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&arg, 0, sizeof(arg));
^~~~~~
fs/fuse/dev.c:1056:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&arg, 0, sizeof(arg));
^~~~~~
fs/fuse/dev.c:1704:30: warning: The left operand of '<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
while (num && ap->num_pages < num_pages) {
^
fs/fuse/dev.c:1972:6: note: Assuming 'fud' is non-null
if (!fud)
^~~~
fs/fuse/dev.c:1972:2: note: Taking false branch
if (!fud)
^
fs/fuse/dev.c:1983:6: note: Assuming 'bufs' is non-null
if (!bufs) {
^~~~~
fs/fuse/dev.c:1983:2: note: Taking false branch
if (!bufs) {
^
fs/fuse/dev.c:1990:19: note: Assuming 'idx' is not equal to 'head'
for (idx = tail; idx != head && rem < len; idx++)
^~~~~~~~~~~
fs/fuse/dev.c:1990:19: note: Left side of '&&' is true
fs/fuse/dev.c:1990:34: note: Assuming 'rem' is < 'len'
for (idx = tail; idx != head && rem < len; idx++)
^~~~~~~~~
fs/fuse/dev.c:1990:2: note: Loop condition is true. Entering loop body
for (idx = tail; idx != head && rem < len; idx++)
^
fs/fuse/dev.c:1990:19: note: Assuming 'idx' is equal to 'head'
for (idx = tail; idx != head && rem < len; idx++)
^~~~~~~~~~~
fs/fuse/dev.c:1990:31: note: Left side of '&&' is false
for (idx = tail; idx != head && rem < len; idx++)
^
fs/fuse/dev.c:1994:6: note: Assuming 'rem' is >= 'len'
if (rem < len)
^~~~~~~~~
fs/fuse/dev.c:1994:2: note: Taking false branch
if (rem < len)
^
fs/fuse/dev.c:1998:2: note: Loop condition is true. Entering loop body
while (rem) {
^
fs/fuse/dev.c:2002:15: note: 'nbuf' is < 'count'
if (WARN_ON(nbuf >= count || tail == head))
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
fs/fuse/dev.c:2002:15: note: Left side of '||' is false
if (WARN_ON(nbuf >= count || tail == head))
^
fs/fuse/dev.c:2002:32: note: 'tail' is not equal to 'head'
--
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/hid/hid-input.c:2016:12: note: Field 'input_configured' is null
if (drv->input_configured &&
^
drivers/hid/hid-input.c:2016:29: note: Left side of '&&' is false
if (drv->input_configured &&
^
drivers/hid/hid-input.c:2020:7: note: Assuming the condition is false
if (!hidinput_has_been_populated(hidinput)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2020:3: note: Taking false branch
if (!hidinput_has_been_populated(hidinput)) {
^
drivers/hid/hid-input.c:2026:7: note: Assuming the condition is true
if (input_register_device(hidinput->input))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2026:3: note: Taking true branch
if (input_register_device(hidinput->input))
^
drivers/hid/hid-input.c:2027:4: note: Control jumps to line 2044
goto out_unwind;
^
drivers/hid/hid-input.c:2044:2: note: Calling 'hidinput_disconnect'
hidinput_disconnect(hid);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2056:2: note: Use of memory after it is freed
list_for_each_entry_safe(hidinput, next, &hid->inputs, list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/nvme/host/zns.c:202:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(report, 0, buflen);
^~~~~~
drivers/nvme/host/zns.c:202:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(report, 0, buflen);
^~~~~~
drivers/nvme/host/zns.c:239:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c, 0, sizeof(*c));
^~~~~~
drivers/nvme/host/zns.c:239:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(c, 0, sizeof(*c));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
drivers/nvme/host/fabrics.c:70:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(host->nqn, NVMF_NQN_SIZE,
^~~~~~~~
drivers/nvme/host/fabrics.c:70:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(host->nqn, NVMF_NQN_SIZE,
^~~~~~~~
drivers/nvme/host/fabrics.c:151:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/nvme/host/fabrics.c:151:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/nvme/host/fabrics.c:389:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data->subsysnqn, ctrl->opts->subsysnqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:389:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data->subsysnqn, ctrl->opts->subsysnqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:390:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data->hostnqn, ctrl->opts->host->nqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:390:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data->hostnqn, ctrl->opts->host->nqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:450:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data->subsysnqn, ctrl->opts->subsysnqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:450:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data->subsysnqn, ctrl->opts->subsysnqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:451:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data->hostnqn, ctrl->opts->host->nqn, NVMF_NQN_SIZE);
^~~~~~~
drivers/nvme/host/fabrics.c:451:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data->hostnqn, ctrl->opts->host->nqn, NVMF_NQN_SIZE);
^~~~~~~
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> fs/hfs/mdb.c:192:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, bh->b_data + off2, len);
^~~~~~
fs/hfs/mdb.c:192:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, bh->b_data + off2, len);
^~~~~~
fs/hfs/mdb.c:297:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(HFS_SB(sb)->alt_mdb, HFS_SB(sb)->mdb, HFS_SECTOR_SIZE);
^~~~~~
fs/hfs/mdb.c:297:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(HFS_SB(sb)->alt_mdb, HFS_SB(sb)->mdb, HFS_SECTOR_SIZE);
^~~~~~
fs/hfs/mdb.c:326:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bh->b_data + off, ptr, len);
^~~~~~
fs/hfs/mdb.c:326:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bh->b_data + off, ptr, len);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> drivers/perf/arm_pmu.c:396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fake_pmu.used_mask, 0, sizeof(fake_pmu.used_mask));
^~~~~~
drivers/perf/arm_pmu.c:396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fake_pmu.used_mask, 0, sizeof(fake_pmu.used_mask));
^~~~~~
include/asm-generic/bitops/non-atomic.h:118:16: warning: Array access (from variable 'addr') results in a null pointer dereference [clang-analyzer-core.NullDereference]
return 1UL & (addr[BIT_WORD(nr)] >> (nr & (BITS_PER_LONG-1)));
^
drivers/perf/arm_pmu.c:727:24: note: Assuming '____ptr' is null
struct arm_pmu *pmu = hlist_entry_safe(node, struct arm_pmu, node);
^
include/linux/list.h:993:5: note: expanded from macro 'hlist_entry_safe'
____ptr ? hlist_entry(____ptr, type, member) : NULL; \
^~~~~~~
drivers/perf/arm_pmu.c:727:24: note: '?' condition is false
struct arm_pmu *pmu = hlist_entry_safe(node, struct arm_pmu, node);
^
include/linux/list.h:993:5: note: expanded from macro 'hlist_entry_safe'
____ptr ? hlist_entry(____ptr, type, member) : NULL; \
^
drivers/perf/arm_pmu.c:730:7: note: Calling 'cpumask_test_cpu'
if (!cpumask_test_cpu(cpu, &pmu->supported_cpus))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cpumask.h:379:38: note: Passing null pointer value via 2nd parameter 'addr'
return test_bit(cpumask_check(cpu), cpumask_bits((cpumask)));
^
include/linux/cpumask.h:26:29: note: expanded from macro 'cpumask_bits'
#define cpumask_bits(maskp) ((maskp)->bits)
^~~~~~~~~~~~~~~
include/linux/cpumask.h:379:9: note: Calling 'arch_test_bit'
return test_bit(cpumask_check(cpu), cpumask_bits((cpumask)));
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
include/asm-generic/bitops/non-atomic.h:118:16: note: Array access (from variable 'addr') results in a null pointer dereference
return 1UL & (addr[BIT_WORD(nr)] >> (nr & (BITS_PER_LONG-1)));
^~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/of/irq.c:404:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(*r));
^~~~~~
drivers/of/irq.c:404:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(*r));
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
drivers/of/unittest.c:283:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xff, buf_size);
^~~~~~
drivers/of/unittest.c:283:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xff, buf_size);
^~~~~~
drivers/of/unittest.c:284:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size = snprintf(buf, buf_size - 2, fmt, np);
^~~~~~~~
drivers/of/unittest.c:284:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
size = snprintf(buf, buf_size - 2, fmt, np);
^~~~~~~~
drivers/of/unittest.c:295:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xff, buf_size);
^~~~~~
drivers/of/unittest.c:295:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xff, buf_size);
^~~~~~
drivers/of/unittest.c:296:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, size+1, fmt, np);
^~~~~~~~
drivers/of/unittest.c:296:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, size+1, fmt, np);
^~~~~~~~
drivers/of/unittest.c:400:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:400:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:454:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:454:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:463:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:463:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:488:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:488:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:513:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:513:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:580:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:580:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:644:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:644:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:657:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:657:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1022:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1022:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1043:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1043:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1099:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1099:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/of/unittest.c:1446:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(unittest_data_align, __dtb_testcases_begin, size);
^~~~~~
drivers/of/unittest.c:1446:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(unittest_data_align, __dtb_testcases_begin, size);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
>> drivers/pwm/pwm-cros-ec.c:70:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buf, 0, sizeof(buf));
^~~~~~
drivers/pwm/pwm-cros-ec.c:70:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buf, 0, sizeof(buf));
^~~~~~
drivers/pwm/pwm-cros-ec.c:98:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buf, 0, sizeof(buf));
^~~~~~
drivers/pwm/pwm-cros-ec.c:98:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buf, 0, sizeof(buf));
^~~~~~
Suppressed 23 warnings (16 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/video/backlight/bd6107.c:157:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&props, 0, sizeof(props));
^~~~~~
drivers/video/backlight/bd6107.c:157:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&props, 0, sizeof(props));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/video/backlight/backlight.c:139:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bd->fb_notif, 0, sizeof(bd->fb_notif));
^~~~~~
drivers/video/backlight/backlight.c:139:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bd->fb_notif, 0, sizeof(bd->fb_notif));
^~~~~~
drivers/video/backlight/backlight.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bd->props.power);
^~~~~~~
drivers/video/backlight/backlight.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bd->props.power);
^~~~~~~
drivers/video/backlight/backlight.c:227:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bd->props.brightness);
^~~~~~~
drivers/video/backlight/backlight.c:227:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bd->props.brightness);
^~~~~~~
drivers/video/backlight/backlight.c:275:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", backlight_types[bd->props.type]);
^~~~~~~
drivers/video/backlight/backlight.c:275:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", backlight_types[bd->props.type]);
^~~~~~~
drivers/video/backlight/backlight.c:284:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bd->props.max_brightness);
^~~~~~~
drivers/video/backlight/backlight.c:284:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bd->props.max_brightness);
^~~~~~~
drivers/video/backlight/backlight.c:298:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rc = sprintf(buf, "%d\n", rc);
^~~~~~~
drivers/video/backlight/backlight.c:298:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rc = sprintf(buf, "%d\n", rc);
^~~~~~~
drivers/video/backlight/backlight.c:300:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rc = sprintf(buf, "%d\n", bd->props.brightness);
^~~~~~~
drivers/video/backlight/backlight.c:300:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rc = sprintf(buf, "%d\n", bd->props.brightness);
^~~~~~~
drivers/video/backlight/backlight.c:314:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "unknown\n");
^~~~~~~
drivers/video/backlight/backlight.c:314:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "unknown\n");
^~~~~~~
drivers/video/backlight/backlight.c:316:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", backlight_scale_types[bd->props.scale]);
^~~~~~~
drivers/video/backlight/backlight.c:316:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", backlight_scale_types[bd->props.scale]);
^~~~~~~
drivers/video/backlight/backlight.c:429:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_bd->props, props,
^~~~~~
drivers/video/backlight/backlight.c:429:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_bd->props, props,
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
crypto/curve25519-generic.c:18:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(secret, buf, CURVE25519_KEY_SIZE);
^~~~~~
crypto/curve25519-generic.c:18:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(secret, buf, CURVE25519_KEY_SIZE);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
crypto/ecdh.c:40:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->private_key, params.key, params.key_size);
^~~~~~
crypto/ecdh.c:40:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->private_key, params.key, params.key_size);
--
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/scsi/scsi_devinfo.c:295:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(to, from, to_length);
^~~~~~~
drivers/scsi/scsi_devinfo.c:295:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(to, from, to_length);
^~~~~~~
drivers/scsi/scsi_devinfo.c:300:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&to[from_length], ' ', to_length - from_length);
^~~~~~
drivers/scsi/scsi_devinfo.c:300:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&to[from_length], ' ', to_length - from_length);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
crypto/xts.c:366:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(ctx->name, CRYPTO_MAX_ALG_NAME, "ecb(%s)",
^~~~~~~~
crypto/xts.c:366:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(ctx->name, CRYPTO_MAX_ALG_NAME, "ecb(%s)",
^~~~~~~~
crypto/xts.c:410:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/xts.c:410:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
crypto/adiantum.c:552:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/adiantum.c:552:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/adiantum.c:556:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/adiantum.c:556:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/jffs2/fs.c:445:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ri, 0, sizeof(*ri));
^~~~~~
fs/jffs2/fs.c:445:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ri, 0, sizeof(*ri));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> fs/jffs2/xattr.c:303:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rx, 0, sizeof(rx));
^~~~~~
fs/jffs2/xattr.c:303:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rx, 0, sizeof(rx));
^~~~~~
fs/jffs2/xattr.c:372:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(data, xname);
^~~~~~
fs/jffs2/xattr.c:372:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(data, xname);
^~~~~~
>> fs/jffs2/xattr.c:373:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + name_len + 1, xvalue, xsize);
^~~~~~
fs/jffs2/xattr.c:373:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + name_len + 1, xvalue, xsize);
^~~~~~
fs/jffs2/xattr.c:1013:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, prefix, prefix_len);
^~~~~~
fs/jffs2/xattr.c:1013:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, prefix, prefix_len);
^~~~~~
fs/jffs2/xattr.c:1015:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, xd->xname, xd->name_len);
^~~~~~
fs/jffs2/xattr.c:1015:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, xd->xname, xd->name_len);
^~~~~~
fs/jffs2/xattr.c:1077:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, xd->xvalue, rc);
^~~~~~
fs/jffs2/xattr.c:1077:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, xd->xvalue, rc);
^~~~~~
fs/jffs2/xattr.c:1236:2: warning: Value stored to 'old_ofs' is never read [clang-analyzer-deadcode.DeadStores]
old_ofs = ref_offset(xd->node);
^
fs/jffs2/xattr.c:1236:2: note: Value stored to 'old_ofs' is never read
fs/jffs2/xattr.c:1269:2: warning: Value stored to 'old_ofs' is never read [clang-analyzer-deadcode.DeadStores]
old_ofs = ref_offset(ref->node);
^
fs/jffs2/xattr.c:1269:2: note: Value stored to 'old_ofs' is never read
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
mm/z3fold.c:404:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(zhdr, 0, sizeof(*zhdr));
^~~~~~
mm/z3fold.c:404:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(zhdr, 0, sizeof(*zhdr));
^~~~~~
mm/z3fold.c:646:9: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return memmove(beg + (dst_chunk << CHUNK_SHIFT),
^~~~~~~
mm/z3fold.c:646:9: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
return memmove(beg + (dst_chunk << CHUNK_SHIFT),
^~~~~~~
mm/z3fold.c:724:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(q, p, sz);
^~~~~~
mm/z3fold.c:724:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(q, p, sz);
^~~~~~
mm/z3fold.c:1403:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(slots.slot, 0, sizeof(slots.slot));
^~~~~~
mm/z3fold.c:1403:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(slots.slot, 0, sizeof(slots.slot));
^~~~~~
mm/z3fold.c:1628:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_zhdr, zhdr, PAGE_SIZE);
^~~~~~
mm/z3fold.c:1628:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_zhdr, zhdr, PAGE_SIZE);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/dma/qcom/hidma_mgmt.c:375:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdevinfo, 0, sizeof(pdevinfo));
^~~~~~
drivers/dma/qcom/hidma_mgmt.c:375:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdevinfo, 0, sizeof(pdevinfo));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> drivers/tty/serial/8250/8250_tegra.c:54:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port8250, 0, sizeof(port8250));
^~~~~~
drivers/tty/serial/8250/8250_tegra.c:54:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port8250, 0, sizeof(port8250));
^~~~~~
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> drivers/tty/serial/8250/8250_of.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port, 0, sizeof *port);
^~~~~~
drivers/tty/serial/8250/8250_of.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port, 0, sizeof *port);
^~~~~~
drivers/tty/serial/8250/8250_of.c:219:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port8250, 0, sizeof(port8250));
^~~~~~
drivers/tty/serial/8250/8250_of.c:219:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port8250, 0, sizeof(port8250));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/mfd/qcom-pm8xxx.c:549:2: warning: Value stored to 'rev' is never read [clang-analyzer-deadcode.DeadStores]
rev |= val << BITS_PER_BYTE;
^ ~~~~~~~~~~~~~~~~~~~~
drivers/mfd/qcom-pm8xxx.c:549:2: note: Value stored to 'rev' is never read
rev |= val << BITS_PER_BYTE;
^ ~~~~~~~~~~~~~~~~~~~~
Suppressed 17 warnings (16 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
4 warnings generated.
lib/zstd/common/fse_decompress.c:101:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(dt, &DTableH, sizeof(DTableH));
^
lib/zstd/common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/common/fse_decompress.c:101:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(dt, &DTableH, sizeof(DTableH));
^
lib/zstd/common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
10 warnings generated.
lib/zstd/common/zstd_common.c:69:9: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(ptr, 0, size);
^
lib/zstd/common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/common/zstd_common.c:69:9: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(ptr, 0, size);
^
lib/zstd/common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
lib/zstd/compress/fse_compress.c:85:9: warning: The result of the left shift is undefined due to shifting by '4294967294', which is greater or equal to the width of type 'unsigned long long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) > wkspSize) return ERROR(tableLog_tooLarge);
^
lib/zstd/compress/../common/fse.h:338:87: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) (sizeof(unsigned) * FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/../common/fse.h:337:99: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue + 2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: Assuming 'tableLog' is 0
void* const FSCT = ((U32*)ptr) + 1 /* header */ + (tableLog ? tableSize>>1 : 1) ;
^~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: '?' condition is false
lib/zstd/compress/fse_compress.c:84:9: note: Assuming the condition is false
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:84:5: note: Taking false branch
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^
lib/zstd/compress/fse_compress.c:85:9: note: The result of the left shift is undefined due to shifting by '4294967294', which is greater or equal to the width of type 'unsigned long long'
if (FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) > wkspSize) return ERROR(tableLog_tooLarge);
^
lib/zstd/compress/../common/fse.h:338:87: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) (sizeof(unsigned) * FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/../common/fse.h:337:99: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue + 2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless initialization, just to keep scan-build happy */
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless initialization, just to keep scan-build happy */
--
^
fs/namei.c:3687:10: note: Returning from 'filename_parentat'
error = filename_parentat(dfd, name, lookup_flags, path, &last, &type);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namei.c:3688:6: note: 'error' is not equal to 0
if (error)
^~~~~
fs/namei.c:3688:2: note: Taking true branch
if (error)
^
fs/namei.c:3689:3: note: Returning without writing to 'path->mnt'
return ERR_PTR(error);
^
fs/namei.c:4482:15: note: Returning from 'filename_create'
new_dentry = filename_create(newdfd, new, &new_path,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namei.c:4485:6: note: Calling 'IS_ERR'
if (IS_ERR(new_dentry))
^~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namei.c:4485:6: note: Returning from 'IS_ERR'
if (IS_ERR(new_dentry))
^~~~~~~~~~~~~~~~~~
fs/namei.c:4485:2: note: Taking false branch
if (IS_ERR(new_dentry))
^
fs/namei.c:4489:19: note: The right operand of '!=' is a garbage value
if (old_path.mnt != new_path.mnt)
^ ~~~~~~~~~~~~
fs/namei.c:5025:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page), symname, len-1);
^~~~~~
fs/namei.c:5025:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page), symname, len-1);
^~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/phy/cadence/cdns-dphy.c:103:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cfg, 0, sizeof(*cfg));
^~~~~~
drivers/phy/cadence/cdns-dphy.c:103:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cfg, 0, sizeof(*cfg));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
^~~~~~
drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
drivers/nfc/st-nci/se.c:144:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(info->se_info.atr, skb->data, skb->len);
^~~~~~
drivers/nfc/st-nci/se.c:144:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(info->se_info.atr, skb->data, skb->len);
^~~~~~
drivers/nfc/st-nci/se.c:338:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(transaction->aid, &skb->data[2], transaction->aid_len);
^~~~~~
drivers/nfc/st-nci/se.c:338:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(transaction->aid, &skb->data[2], transaction->aid_len);
^~~~~~
drivers/nfc/st-nci/se.c:346:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(transaction->params, skb->data +
^~~~~~
drivers/nfc/st-nci/se.c:346:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(transaction->params, skb->data +
^~~~~~
drivers/nfc/st-nci/se.c:540:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest_params->value, &spec_params,
^~~~~~
drivers/nfc/st-nci/se.c:540:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest_params->value, &spec_params,
^~~~~~
drivers/nfc/st-nci/se.c:554:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ndev->hci_dev->init_data.gates, st_nci_gates,
^~~~~~
drivers/nfc/st-nci/se.c:554:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ndev->hci_dev->init_data.gates, st_nci_gates,
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
>> fs/binfmt_elf_fdpic.c:202:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&exec_params, 0, sizeof(exec_params));
^~~~~~
fs/binfmt_elf_fdpic.c:202:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&exec_params, 0, sizeof(exec_params));
^~~~~~
fs/binfmt_elf_fdpic.c:203:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&interp_params, 0, sizeof(interp_params));
^~~~~~
fs/binfmt_elf_fdpic.c:203:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&interp_params, 0, sizeof(interp_params));
^~~~~~
fs/binfmt_elf_fdpic.c:333:2: warning: Value stored to 'retval' is never read [clang-analyzer-deadcode.DeadStores]
retval = -ENOEXEC;
^ ~~~~~~~~
fs/binfmt_elf_fdpic.c:333:2: note: Value stored to 'retval' is never read
retval = -ENOEXEC;
^ ~~~~~~~~
fs/binfmt_elf_fdpic.c:335:3: warning: Value stored to 'stack_size' is never read [clang-analyzer-deadcode.DeadStores]
stack_size = 131072UL; /* same as exec.c's default commit */
^ ~~~~~~~~
fs/binfmt_elf_fdpic.c:335:3: note: Value stored to 'stack_size' is never read
stack_size = 131072UL; /* same as exec.c's default commit */
^ ~~~~~~~~
fs/binfmt_elf_fdpic.c:464:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
start_thread(regs, entryaddr, current->mm->start_stack);
^
arch/arm/include/asm/processor.h:61:2: note: expanded from macro 'start_thread'
memset(regs->uregs, 0, sizeof(regs->uregs)); \
^~~~~~
fs/binfmt_elf_fdpic.c:464:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
start_thread(regs, entryaddr, current->mm->start_stack);
^
arch/arm/include/asm/processor.h:61:2: note: expanded from macro 'start_thread'
memset(regs->uregs, 0, sizeof(regs->uregs)); \
^~~~~~
fs/binfmt_elf_fdpic.c:772:2: warning: Value stored to 'load_addr' is never read [clang-analyzer-deadcode.DeadStores]
load_addr = params->load_addr;
^ ~~~~~~~~~~~~~~~~~
fs/binfmt_elf_fdpic.c:772:2: note: Value stored to 'load_addr' is never read
load_addr = params->load_addr;
^ ~~~~~~~~~~~~~~~~~
fs/binfmt_elf_fdpic.c:773:2: warning: Value stored to 'seg' is never read [clang-analyzer-deadcode.DeadStores]
seg = loadmap->segs;
^ ~~~~~~~~~~~~~
fs/binfmt_elf_fdpic.c:773:2: note: Value stored to 'seg' is never read
seg = loadmap->segs;
^ ~~~~~~~~~~~~~
>> fs/binfmt_elf_fdpic.c:1239:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(elf->e_ident, ELFMAG, SELFMAG);
^~~~~~
fs/binfmt_elf_fdpic.c:1239:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(elf->e_ident, ELFMAG, SELFMAG);
^~~~~~
fs/binfmt_elf_fdpic.c:1244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(elf->e_ident+EI_PAD, 0, EI_NIDENT-EI_PAD);
^~~~~~
fs/binfmt_elf_fdpic.c:1244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(elf->e_ident+EI_PAD, 0, EI_NIDENT-EI_PAD);
^~~~~~
fs/binfmt_elf_fdpic.c:1330:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(psinfo, 0, sizeof(struct elf_prpsinfo));
^~~~~~
fs/binfmt_elf_fdpic.c:1330:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(psinfo, 0, sizeof(struct elf_prpsinfo));
^~~~~~
>> fs/binfmt_elf_fdpic.c:1362:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(psinfo->pr_fname, p->comm, sizeof(psinfo->pr_fname));
^~~~~~~
fs/binfmt_elf_fdpic.c:1362:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(psinfo->pr_fname, p->comm, sizeof(psinfo->pr_fname));
^~~~~~~
fs/binfmt_elf_fdpic.c:1432:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shdr4extnum, 0, sizeof(*shdr4extnum));
^~~~~~
fs/binfmt_elf_fdpic.c:1432:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shdr4extnum, 0, sizeof(*shdr4extnum));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
drivers/misc/apds990x.c:588:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(chip->chipname, sizeof(chip->chipname), "APDS-990x");
^~~~~~~~
drivers/misc/apds990x.c:588:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(chip->chipname, sizeof(chip->chipname), "APDS-990x");
^~~~~~~~
drivers/misc/apds990x.c:644:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d.%d\n",
^~~~~~~
drivers/misc/apds990x.c:644:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d.%d\n",
^~~~~~~
drivers/misc/apds990x.c:656:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", APDS_RANGE);
^~~~~~~
drivers/misc/apds990x.c:656:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", APDS_RANGE);
^~~~~~~
drivers/misc/apds990x.c:664:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", APDS_CALIB_SCALER);
^~~~~~~
drivers/misc/apds990x.c:664:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", APDS_CALIB_SCALER);
^~~~~~~
drivers/misc/apds990x.c:675:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", chip->lux_calib);
^~~~~~~
drivers/misc/apds990x.c:675:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", chip->lux_calib);
^~~~~~~
drivers/misc/apds990x.c:705:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%d ", arates_hz[i]);
^~~~~~~
drivers/misc/apds990x.c:705:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%d ", arates_hz[i]);
^~~~~~~
drivers/misc/apds990x.c:706:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf + pos - 1, "\n");
^~~~~~~
drivers/misc/apds990x.c:706:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf + pos - 1, "\n");
^~~~~~~
drivers/misc/apds990x.c:715:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", chip->arate);
^~~~~~~
drivers/misc/apds990x.c:715:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", chip->arate);
^~~~~~~
drivers/misc/apds990x.c:779:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d\n", chip->prox_data);
^~~~~~~
drivers/misc/apds990x.c:779:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d\n", chip->prox_data);
^~~~~~~
drivers/misc/apds990x.c:789:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", APDS_PROX_RANGE);
^~~~~~~
drivers/misc/apds990x.c:789:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", APDS_PROX_RANGE);
^~~~~~~
drivers/misc/apds990x.c:799:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", chip->prox_en);
^~~~~~~
drivers/misc/apds990x.c:799:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", chip->prox_en);
^~~~~~~
drivers/misc/apds990x.c:840:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n",
^~~~~~~
drivers/misc/apds990x.c:840:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n",
^~~~~~~
drivers/misc/apds990x.c:866:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s %s\n", reporting_modes[0], reporting_modes[1]);
^~~~~~~
drivers/misc/apds990x.c:866:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s %s\n", reporting_modes[0], reporting_modes[1]);
^~~~~~~
drivers/misc/apds990x.c:878:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", chip->lux_thres_hi);
^~~~~~~
drivers/misc/apds990x.c:878:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", chip->lux_thres_hi);
^~~~~~~
drivers/misc/apds990x.c:886:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", chip->lux_thres_lo);
--
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:318:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->name, dep->name, dep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:485:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->name, args->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:485:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->name, args->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:535:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oldsfp, sfp, old_isize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:535:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(oldsfp, sfp, old_isize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:568:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfp, oldsfp, nbytes);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:568:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfp, oldsfp, nbytes);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:575:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->name, args->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:575:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->name, args->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:586:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep, oldsfep, old_isize - nbytes);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:586:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep, oldsfep, old_isize - nbytes);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:990:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove((char *)sfp + byteoff, (char *)sfp + byteoff + entsize,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:990:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove((char *)sfp + byteoff, (char *)sfp + byteoff + entsize,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1182:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, oldsfp, oldsize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1182:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, oldsfp, oldsize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1209:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->offset, oldsfep->offset, sizeof(sfep->offset));
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1209:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->offset, oldsfep->offset, sizeof(sfep->offset));
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1210:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->name, oldsfep->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1210:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->name, oldsfep->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1255:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, oldsfp, oldsize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1255:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, oldsfp, oldsize);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1282:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->offset, oldsfep->offset, sizeof(sfep->offset));
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1282:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->offset, oldsfep->offset, sizeof(sfep->offset));
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1283:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sfep->name, oldsfep->name, sfep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_sf.c:1283:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sfep->name, oldsfep->name, sfep->namelen);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/exfat/fatent.c:26:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(c_bh->b_data, bh->b_data, sb->s_blocksize);
^~~~~~
fs/exfat/fatent.c:26:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(c_bh->b_data, bh->b_data, sb->s_blocksize);
^~~~~~
fs/exfat/fatent.c:301:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bhs[n]->b_data, 0, sb->s_blocksize);
^~~~~~
fs/exfat/fatent.c:301:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bhs[n]->b_data, 0, sb->s_blocksize);
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> fs/hfs/super.c:138:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
seq_show_option_n(seq, "creator", (char *)&sbi->s_creator, 4);
^
include/linux/seq_file.h:262:2: note: expanded from macro 'seq_show_option_n'
strncpy(val_buf, value, length); \
^~~~~~~
fs/hfs/super.c:138:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
seq_show_option_n(seq, "creator", (char *)&sbi->s_creator, 4);
^
include/linux/seq_file.h:262:2: note: expanded from macro 'seq_show_option_n'
strncpy(val_buf, value, length); \
^~~~~~~
fs/hfs/super.c:140:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
seq_show_option_n(seq, "type", (char *)&sbi->s_type, 4);
^
include/linux/seq_file.h:262:2: note: expanded from macro 'seq_show_option_n'
strncpy(val_buf, value, length); \
^~~~~~~
fs/hfs/super.c:140:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
seq_show_option_n(seq, "type", (char *)&sbi->s_type, 4);
^
include/linux/seq_file.h:262:2: note: expanded from macro 'seq_show_option_n'
strncpy(val_buf, value, length); \
^~~~~~~
>> fs/hfs/super.c:213:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(result, arg->from, 4);
^~~~~~
fs/hfs/super.c:213:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(result, arg->from, 4);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
>> net/ieee802154/nl802154.c:1468:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(commands, 0, sizeof(commands));
^~~~~~
net/ieee802154/nl802154.c:1468:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(commands, 0, sizeof(commands));
^~~~~~
net/ieee802154/nl802154.c:1739:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dev, 0, sizeof(*dev));
^~~~~~
net/ieee802154/nl802154.c:1739:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dev, 0, sizeof(*dev));
^~~~~~
net/ieee802154/nl802154.c:2090:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sl, 0, sizeof(*sl));
^~~~~~
net/ieee802154/nl802154.c:2090:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sl, 0, sizeof(*sl));
^~~~~~
Suppressed 73 warnings (73 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
85 warnings generated.
net/ieee802154/socket.c:728:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(saddr, 0, sizeof(*saddr));
^~~~~~
net/ieee802154/socket.c:728:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(saddr, 0, sizeof(*saddr));
^~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
net/caif/caif_usb.c:69:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(zeros, 0, hpad);
^~~~~~
net/caif/caif_usb.c:69:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(zeros, 0, hpad);
^~~~~~
net/caif/caif_usb.c:94:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&this->layer, 0, sizeof(this->layer));
^~~~~~
net/caif/caif_usb.c:94:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&this->layer, 0, sizeof(this->layer));
^~~~~~
net/caif/caif_usb.c:98:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(this->layer.name, CAIF_LAYER_NAME_SZ, "usb%d", phyid);
^~~~~~~~
net/caif/caif_usb.c:98:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(this->layer.name, CAIF_LAYER_NAME_SZ, "usb%d", phyid);
^~~~~~~~
net/caif/caif_usb.c:162:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&common, 0, sizeof(common));
^~~~~~
net/caif/caif_usb.c:162:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&common, 0, sizeof(common));
^~~~~~
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
86 warnings generated.
net/dcb/dcbnl.c:271:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(perm_addr, 0, sizeof(perm_addr));
^~~~~~
net/dcb/dcbnl.c:271:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(perm_addr, 0, sizeof(perm_addr));
^~~~~~
net/dcb/dcbnl.c:1048:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ets, 0, sizeof(ets));
^~~~~~
net/dcb/dcbnl.c:1048:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ets, 0, sizeof(ets));
^~~~~~
net/dcb/dcbnl.c:1057:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&maxrate, 0, sizeof(maxrate));
^~~~~~
net/dcb/dcbnl.c:1057:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&maxrate, 0, sizeof(maxrate));
^~~~~~
net/dcb/dcbnl.c:1070:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&qcn, 0, sizeof(qcn));
^~~~~~
net/dcb/dcbnl.c:1070:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&qcn, 0, sizeof(qcn));
^~~~~~
net/dcb/dcbnl.c:1083:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&qcn_stats, 0, sizeof(qcn_stats));
^~~~~~
net/dcb/dcbnl.c:1083:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&qcn_stats, 0, sizeof(qcn_stats));
^~~~~~
net/dcb/dcbnl.c:1095:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pfc, 0, sizeof(pfc));
^~~~~~
net/dcb/dcbnl.c:1095:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pfc, 0, sizeof(pfc));
^~~~~~
net/dcb/dcbnl.c:1105:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buffer, 0, sizeof(buffer));
--
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/nvme/host/fc.c:530:2: note: Assuming '__ret_warn_on' is 0
WARN_ON(!list_empty(&rport->ctrl_list));
^
include/asm-generic/bug.h:122:6: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/nvme/host/fc.c:530:2: note: Taking false branch
WARN_ON(!list_empty(&rport->ctrl_list));
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/nvme/host/fc.c:533:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&nvme_fc_lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/nvme/host/fc.c:533:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&nvme_fc_lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/nvme/host/fc.c:537:2: note: Assuming '__ret_warn_on' is 0
WARN_ON(!list_empty(&rport->disc_list));
^
include/asm-generic/bug.h:122:6: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/nvme/host/fc.c:537:2: note: Taking false branch
WARN_ON(!list_empty(&rport->disc_list));
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/nvme/host/fc.c:540:2: note: Memory is released
kfree(rport);
^~~~~~~~~~~~
include/linux/kref.h:65:3: note: Returning; memory was released
release(kref);
^~~~~~~~~~~~~
drivers/nvme/host/fc.c:548:2: note: Returning; memory was released
kref_put(&rport->ref, nvme_fc_free_rport);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/host/fc.c:3826:3: note: Returning; memory was released
nvme_fc_rport_put(rport);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/host/fc.c:3829:3: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&nvme_fc_lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/nvme/host/fc.c:3829:3: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&nvme_fc_lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/nvme/host/fc.c:3817:2: note: Loop condition is true. Entering loop body
while (!list_empty(&local_disc_list)) {
^
drivers/nvme/host/fc.c:3820:3: note: Calling 'list_del_init'
list_del_init(&rport->disc_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:206:2: note: Calling '__list_del_entry'
__list_del_entry(entry);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:6: note: Assuming the condition is false
if (!__list_del_entry_valid(entry))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:2: note: Taking false branch
if (!__list_del_entry_valid(entry))
^
include/linux/list.h:137:13: note: Use of memory after it is freed
__list_del(entry->prev, entry->next);
^~~~~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
Suppressed 87 warnings (86 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
>> net/bridge/br_vlan_options.c:442:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bvm, 0, sizeof(*bvm));
^~~~~~
net/bridge/br_vlan_options.c:442:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bvm, 0, sizeof(*bvm));
^~~~~~
Suppressed 86 warnings (85 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/atm/addr.c:155:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp_bufp++, &this->addr, sizeof(struct sockaddr_atmsvc));
^~~~~~
net/atm/addr.c:155:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp_bufp++, &this->addr, sizeof(struct sockaddr_atmsvc));
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/atm/pvc.c:98:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, sizeof(*addr));
^~~~~~
net/atm/pvc.c:98:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, sizeof(*addr));
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/nilfs2/btnode.c:44:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, i_blocksize(inode));
^~~~~~
fs/nilfs2/btnode.c:44:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, i_blocksize(inode));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/nilfs2/bmap.c:499:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bmap->b_u.u_data, 0, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:499:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bmap->b_u.u_data, 0, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:501:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bmap->b_u.u_data, raw_inode->i_bmap, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:501:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bmap->b_u.u_data, raw_inode->i_bmap, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:544:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(raw_inode->i_bmap, bmap->b_u.u_data,
^~~~~~
fs/nilfs2/bmap.c:544:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(raw_inode->i_bmap, bmap->b_u.u_data,
^~~~~~
fs/nilfs2/bmap.c:554:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bmap->b_u, 0, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:554:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bmap->b_u, 0, NILFS_BMAP_SIZE);
^~~~~~
fs/nilfs2/bmap.c:567:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(store->data, bmap->b_u.u_data, sizeof(store->data));
^~~~~~
fs/nilfs2/bmap.c:567:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(store->data, bmap->b_u.u_data, sizeof(store->data));
^~~~~~
fs/nilfs2/bmap.c:576:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bmap->b_u.u_data, store->data, sizeof(store->data));
^~~~~~
fs/nilfs2/bmap.c:576:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bmap->b_u.u_data, store->data, sizeof(store->data));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/joystick/fsia6b.c:152:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(fsia6b->phys, sizeof(fsia6b->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/joystick/fsia6b.c:152:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(fsia6b->phys, sizeof(fsia6b->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/joystick/grip.c:338:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(grip->phys[i], sizeof(grip->phys[i]),
^~~~~~~~
drivers/input/joystick/grip.c:338:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(grip->phys[i], sizeof(grip->phys[i]),
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> drivers/input/joystick/interact.c:235:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(interact->phys, sizeof(interact->phys), "%s/input0", gameport->phys);
^~~~~~~~
drivers/input/joystick/interact.c:235:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(interact->phys, sizeof(interact->phys), "%s/input0", gameport->phys);
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/ufs/dir.c:102:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = ufs_commit_chunk(page, pos, len);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ufs/dir.c:102:2: note: Value stored to 'err' is never read
err = ufs_commit_chunk(page, pos, len);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ufs/dir.c:179:2: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p = (struct ufs_dir_entry *)(kaddr + offs);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ufs/dir.c:179:2: note: Value stored to 'p' is never read
p = (struct ufs_dir_entry *)(kaddr + offs);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ufs/dir.c:389:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(de->d_name, name, namelen + 1);
^~~~~~
fs/ufs/dir.c:389:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(de->d_name, name, namelen + 1);
^~~~~~
fs/ufs/dir.c:564:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(base, 0, PAGE_SIZE);
^~~~~~
fs/ufs/dir.c:564:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(base, 0, PAGE_SIZE);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/mfd/tps6507x.c:77:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&msg[1], src, bytes);
^~~~~~
drivers/mfd/tps6507x.c:77:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&msg[1], src, bytes);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/mfd/mc13xxx-core.c:375:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(buf, sizeof(buf), format, name) > sizeof(buf))
^~~~~~~~
drivers/mfd/mc13xxx-core.c:375:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(buf, sizeof(buf), format, name) > sizeof(buf))
^~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/mfd/ti-lmu.c:159:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(®map_cfg, 0, sizeof(struct regmap_config));
^~~~~~
drivers/mfd/ti-lmu.c:159:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(®map_cfg, 0, sizeof(struct regmap_config));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/qcom-labibb-regulator.c:864:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vreg->desc, reg_data->desc, sizeof(vreg->desc));
^~~~~~
drivers/regulator/qcom-labibb-regulator.c:864:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vreg->desc, reg_data->desc, sizeof(vreg->desc));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/pfuze100-regulator.c:763:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pfuze_chip->regulator_descs, pfuze_chip->pfuze_regulators,
^~~~~~
drivers/regulator/pfuze100-regulator.c:763:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pfuze_chip->regulator_descs, pfuze_chip->pfuze_regulators,
--
^~~~~~~~~~~~~
drivers/input/mouse/cyapa_gen5.c:1897:11: note: Calling 'twos_complement_to_s32'
value = twos_complement_to_s32(value, data_size * 8);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/mouse/cyapa_gen5.c:1855:6: note: Assuming the condition is true
if (value >> (num_bits - 1))
^~~~~~~~~~~~~~~~~~~~~~~
drivers/input/mouse/cyapa_gen5.c:1855:2: note: Taking true branch
if (value >> (num_bits - 1))
^
drivers/input/mouse/cyapa_gen5.c:1856:16: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
value |= -1 << num_bits;
^ ~~~~~~~~
drivers/input/mouse/cyapa_gen5.c:2007:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(cmd));
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2007:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(cmd));
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2186:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(cmd));
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2186:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(cmd));
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2462:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[0], &resp_data[8], 5);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2462:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[0], &resp_data[8], 5);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2464:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[6], &resp_data[13], 6);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2464:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[6], &resp_data[13], 6);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[13], &resp_data[19], 2);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2466:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[13], &resp_data[19], 2);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2525:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[0], &resp_data[33], 5);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2525:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[0], &resp_data[33], 5);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2527:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[6], &resp_data[38], 6);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2527:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[6], &resp_data[38], 6);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2529:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cyapa->product_id[13], &resp_data[44], 2);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2529:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cyapa->product_id[13], &resp_data[44], 2);
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2663:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pip->resp_data, pip->irq_cmd_buf,
^~~~~~
drivers/input/mouse/cyapa_gen5.c:2663:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pip->resp_data, pip->irq_cmd_buf,
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
drivers/nfc/pn544/pn544.c:625:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(uid, data + MIFARE_KEY_LEN,
^~~~~~
drivers/nfc/pn544/pn544.c:625:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(uid, data + MIFARE_KEY_LEN,
^~~~~~
drivers/nfc/pn544/pn544.c:627:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(data + MIFARE_UID_LEN, data,
^~~~~~~
drivers/nfc/pn544/pn544.c:627:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(data + MIFARE_UID_LEN, data,
^~~~~~~
drivers/nfc/pn544/pn544.c:629:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, uid, MIFARE_UID_LEN);
^~~~~~
drivers/nfc/pn544/pn544.c:629:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, uid, MIFARE_UID_LEN);
^~~~~~
drivers/nfc/pn544/pn544.c:927:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(init_data.gates, pn544_gates, sizeof(pn544_gates));
^~~~~~
drivers/nfc/pn544/pn544.c:927:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(init_data.gates, pn544_gates, sizeof(pn544_gates));
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/tty/serial/8250/8250_em.c:106:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&up, 0, sizeof(up));
^~~~~~
drivers/tty/serial/8250/8250_em.c:106:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&up, 0, sizeof(up));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/tty/serial/sccnxp.c:949:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
drivers/tty/serial/sccnxp.c:949:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/misc/hmc6352.c:84:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%d\n", ret/10, ret%10);
^~~~~~~
drivers/misc/hmc6352.c:84:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%d\n", ret/10, ret%10);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
Suppressed 24 warnings (17 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/mfd/gateworks-gsc.c:113:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rz = sprintf(buf, "%d\n", gsc->fwver);
^~~~~~~
drivers/mfd/gateworks-gsc.c:113:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rz = sprintf(buf, "%d\n", gsc->fwver);
^~~~~~~
drivers/mfd/gateworks-gsc.c:115:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rz = sprintf(buf, "0x%04x\n", gsc->fwcrc);
^~~~~~~
drivers/mfd/gateworks-gsc.c:115:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
rz = sprintf(buf, "0x%04x\n", gsc->fwcrc);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/rtc/rtc-rs5c372.c:743:2: warning: Value stored to 'addr' is never read [clang-analyzer-deadcode.DeadStores]
addr = RS5C_ADDR(RS5C_REG_CTRL1);
^
drivers/rtc/rtc-rs5c372.c:743:2: note: Value stored to 'addr' is never read
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/input/rmi4/rmi_f11.c:1129:2: warning: Value stored to 'query_offset' is never read [clang-analyzer-deadcode.DeadStores]
query_offset += rc;
^ ~~
drivers/input/rmi4/rmi_f11.c:1129:2: note: Value stored to 'query_offset' is never read
query_offset += rc;
^ ~~
drivers/input/rmi4/rmi_f11.c:1318:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(f11->sensor.data_pkt, drvdata->attn_data.data,
^~~~~~
drivers/input/rmi4/rmi_f11.c:1318:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(f11->sensor.data_pkt, drvdata->attn_data.data,
^~~~~~
Suppressed 34 warnings (34 in non-user code).
--
for_each_net_rcu(net) {
^
include/net/net_namespace.h:373:2: note: expanded from macro 'for_each_net_rcu'
list_for_each_entry_rcu(VAR, &net_namespace_list, list)
^
include/linux/rculist.h:391:13: note: expanded from macro 'list_for_each_entry_rcu'
pos = list_entry_rcu((head)->next, typeof(*pos), member); \
^
include/linux/rculist.h:307:15: note: expanded from macro 'list_entry_rcu'
container_of(READ_ONCE(ptr), type, member)
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/netlink/genetlink.c:1445:2: note: Left side of '||' is true
for_each_net_rcu(net) {
^
include/net/net_namespace.h:373:2: note: expanded from macro 'for_each_net_rcu'
list_for_each_entry_rcu(VAR, &net_namespace_list, list)
^
include/linux/rculist.h:391:13: note: expanded from macro 'list_for_each_entry_rcu'
pos = list_entry_rcu((head)->next, typeof(*pos), member); \
^
include/linux/rculist.h:307:15: note: expanded from macro 'list_entry_rcu'
container_of(READ_ONCE(ptr), type, member)
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:314:28: note: expanded from macro '__native_word'
sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
^
net/netlink/genetlink.c:1445:2: note: Taking false branch
for_each_net_rcu(net) {
^
include/net/net_namespace.h:373:2: note: expanded from macro 'for_each_net_rcu'
list_for_each_entry_rcu(VAR, &net_namespace_list, list)
^
include/linux/rculist.h:391:13: note: expanded from macro 'list_for_each_entry_rcu'
pos = list_entry_rcu((head)->next, typeof(*pos), member); \
^
include/linux/rculist.h:307:15: note: expanded from macro 'list_entry_rcu'
container_of(READ_ONCE(ptr), type, member)
^
note: (skipping 2 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
net/netlink/genetlink.c:1445:2: note: Loop condition is false. Exiting loop
for_each_net_rcu(net) {
^
include/net/net_namespace.h:373:2: note: expanded from macro 'for_each_net_rcu'
list_for_each_entry_rcu(VAR, &net_namespace_list, list)
^
include/linux/rculist.h:391:13: note: expanded from macro 'list_for_each_entry_rcu'
pos = list_entry_rcu((head)->next, typeof(*pos), member); \
^
include/linux/rculist.h:307:15: note: expanded from macro 'list_entry_rcu'
container_of(READ_ONCE(ptr), type, member)
^
note: (skipping 2 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
net/netlink/genetlink.c:1445:2: note: Loop condition is false. Execution continues on line 1463
for_each_net_rcu(net) {
^
include/net/net_namespace.h:373:2: note: expanded from macro 'for_each_net_rcu'
list_for_each_entry_rcu(VAR, &net_namespace_list, list)
^
include/linux/rculist.h:390:2: note: expanded from macro 'list_for_each_entry_rcu'
for (__list_check_rcu(dummy, ## cond, 0), \
^
net/netlink/genetlink.c:1463:24: note: Access to field 'genl_sock' results in a dereference of a null pointer (loaded from variable 'prev')
err = nlmsg_multicast(prev->genl_sock, skb, portid, group, flags);
^~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/video/fbdev/s3c2410fb.c:589:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", debug ? "on" : "off");
^~~~~~~~
drivers/video/fbdev/s3c2410fb.c:589:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", debug ? "on" : "off");
^~~~~~~~
>> drivers/video/fbdev/s3c2410fb.c:650:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info->screen_base, 0x00, map_size);
^~~~~~
drivers/video/fbdev/s3c2410fb.c:650:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info->screen_base, 0x00, map_size);
^~~~~~
drivers/video/fbdev/s3c2410fb.c:894:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(fbinfo->fix.id, driver_name);
^~~~~~
drivers/video/fbdev/s3c2410fb.c:894:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(fbinfo->fix.id, driver_name);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/ext4/extents_status.c:1075:6: warning: Branch condition evaluates to a garbage value [clang-analyzer-core.uninitialized.Branch]
if (!rc->first_do_lblk_found) {
^
fs/ext4/extents_status.c:1316:6: note: Assuming 'reserved' is not equal to NULL
if (reserved == NULL || !test_opt(inode->i_sb, DELALLOC))
^~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1316:6: note: Left side of '||' is false
fs/ext4/extents_status.c:1316:26: note: Assuming the condition is false
if (reserved == NULL || !test_opt(inode->i_sb, DELALLOC))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1316:2: note: Taking false branch
if (reserved == NULL || !test_opt(inode->i_sb, DELALLOC))
^
fs/ext4/extents_status.c:1322:6: note: Assuming 'es' is non-null
if (!es)
^~~
fs/ext4/extents_status.c:1322:2: note: Taking false branch
if (!es)
^
fs/ext4/extents_status.c:1324:6: note: Assuming 'end' is >= field 'es_lblk'
if (es->es_lblk > end)
^~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1324:2: note: Taking false branch
if (es->es_lblk > end)
^
fs/ext4/extents_status.c:1329:6: note: 'count_reserved' is true
if (count_reserved)
^~~~~~~~~~~~~~
fs/ext4/extents_status.c:1329:2: note: Taking true branch
if (count_reserved)
^
fs/ext4/extents_status.c:1330:3: note: Calling 'init_rsvd'
init_rsvd(inode, lblk, es, &rc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1024:6: note: Assuming field 's_cluster_ratio' is <= 1
if (sbi->s_cluster_ratio > 1) {
^~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1024:2: note: Taking false branch
if (sbi->s_cluster_ratio > 1) {
^
fs/ext4/extents_status.c:1036:1: note: Returning without writing to 'rc->first_do_lblk_found'
}
^
fs/ext4/extents_status.c:1330:3: note: Returning from 'init_rsvd'
init_rsvd(inode, lblk, es, &rc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1336:9: note: Assuming 'lblk' is > field 'es_lblk'
len1 = lblk > es->es_lblk ? lblk - es->es_lblk : 0;
^~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1336:9: note: '?' condition is true
fs/ext4/extents_status.c:1337:9: note: Assuming the condition is false
len2 = ext4_es_end(es) > end ? ext4_es_end(es) - end : 0;
^~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1337:9: note: '?' condition is false
fs/ext4/extents_status.c:1338:6: note: Assuming 'len1' is > 0
if (len1 > 0)
^~~~~~~~
fs/ext4/extents_status.c:1338:2: note: Taking true branch
if (len1 > 0)
^
fs/ext4/extents_status.c:1340:6: note: 'len2' is <= 0
if (len2 > 0) {
^~~~
fs/ext4/extents_status.c:1340:2: note: Taking false branch
if (len2 > 0) {
^
fs/ext4/extents_status.c:1378:6: note: 'len1' is > 0
if (len1 > 0) {
^~~~
fs/ext4/extents_status.c:1378:2: note: Taking true branch
if (len1 > 0) {
^
fs/ext4/extents_status.c:1379:7: note: 'count_reserved' is true
if (count_reserved)
^~~~~~~~~~~~~~
fs/ext4/extents_status.c:1379:3: note: Taking true branch
if (count_reserved)
^
fs/ext4/extents_status.c:1380:4: note: Calling 'count_rsvd'
count_rsvd(inode, lblk, orig_es.es_len - len1,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.c:1058:7: note: Calling 'ext4_es_is_delonly'
if (!ext4_es_is_delonly(es))
^~~~~~~~~~~~~~~~~~~~~~
fs/ext4/extents_status.h:189:10: note: Left side of '&&' is true
return (ext4_es_is_delayed(es) && !ext4_es_is_unwritten(es));
--
^~~~~~
drivers/scsi/scsi_transport_fc.c:3075:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->node_name, &ids->node_name, sizeof(rport->node_name));
^~~~~~
drivers/scsi/scsi_transport_fc.c:3076:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rport->port_name, &ids->port_name, sizeof(rport->port_name));
^~~~~~
drivers/scsi/scsi_transport_fc.c:3076:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->port_name, &ids->port_name, sizeof(rport->port_name));
^~~~~~
drivers/scsi/scsi_transport_fc.c:3224:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rport->node_name, &ids->node_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3224:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->node_name, &ids->node_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3226:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rport->port_name, &ids->port_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3226:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->port_name, &ids->port_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3236:6: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rport->dd_data, 0,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3236:6: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rport->dd_data, 0,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3335:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rport->node_name, &ids->node_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3335:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->node_name, &ids->node_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3337:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rport->port_name, &ids->port_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3337:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rport->port_name, &ids->port_name,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3344:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rport->dd_data, 0,
^~~~~~
drivers/scsi/scsi_transport_fc.c:3344:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rport->dd_data, 0,
^~~~~~
drivers/scsi/scsi_transport_fc.c:4104:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_host_add_rport);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4104:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_host_add_rport);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4108:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_host_del_rport);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4108:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_host_del_rport);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4112:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_host_els);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4112:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_host_els);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4122:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_host_ct);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4122:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_host_ct);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4132:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_host_vendor);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4132:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_host_vendor);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4197:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_rport_els);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4197:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_rport_els);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4201:3: warning: Value stored to 'cmdlen' is never read [clang-analyzer-deadcode.DeadStores]
cmdlen += sizeof(struct fc_bsg_rport_ct);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4201:3: note: Value stored to 'cmdlen' is never read
cmdlen += sizeof(struct fc_bsg_rport_ct);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_transport_fc.c:4290:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(bsg_name, sizeof(bsg_name),
^~~~~~~~
drivers/scsi/scsi_transport_fc.c:4290:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(bsg_name, sizeof(bsg_name),
^~~~~~~~
Suppressed 63 warnings (62 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> drivers/input/mouse/psmouse-base.c:1565:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(psmouse->devname, sizeof(psmouse->devname), "%s %s %s",
^~~~~~~~
drivers/input/mouse/psmouse-base.c:1565:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(psmouse->devname, sizeof(psmouse->devname), "%s %s %s",
^~~~~~~~
drivers/input/mouse/psmouse-base.c:1607:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(psmouse->phys, sizeof(psmouse->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/mouse/psmouse-base.c:1607:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(psmouse->phys, sizeof(psmouse->phys), "%s/input0", serio->phys);
^~~~~~~~
>> drivers/input/mouse/psmouse-base.c:1875:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", *field);
^~~~~~~
drivers/input/mouse/psmouse-base.c:1875:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", *field);
^~~~~~~
>> drivers/input/mouse/psmouse-base.c:1895:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", psmouse->protocol->name);
^~~~~~~
drivers/input/mouse/psmouse-base.c:1895:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", psmouse->protocol->name);
^~~~~~~
drivers/input/mouse/psmouse-base.c:2045:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", psmouse_protocol_by_type(type)->name);
^~~~~~~
drivers/input/mouse/psmouse-base.c:2045:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", psmouse_protocol_by_type(type)->name);
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
drivers/dma/qcom/hidma_mgmt_sys.c:109:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n", hidma_mgmt_files[i].get(mdev));
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:109:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n", hidma_mgmt_files[i].get(mdev));
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:150:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n", mdev->priority[chattr->index]);
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:150:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n", mdev->priority[chattr->index]);
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:152:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n", mdev->weight[chattr->index]);
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:152:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n", mdev->weight[chattr->index]);
^~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:254:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "chan%d", i);
^~~~~~~~
drivers/dma/qcom/hidma_mgmt_sys.c:254:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "chan%d", i);
^~~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/dma/fsl-qdma.c:368:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fsl_comp->virt_addr, 0, FSL_QDMA_COMMAND_BUFFER_SIZE);
^~~~~~
drivers/dma/fsl-qdma.c:368:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fsl_comp->virt_addr, 0, FSL_QDMA_COMMAND_BUFFER_SIZE);
^~~~~~
drivers/dma/fsl-qdma.c:369:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fsl_comp->desc_virt_addr, 0, FSL_QDMA_DESCRIPTOR_BUFFER_SIZE);
^~~~~~
drivers/dma/fsl-qdma.c:369:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fsl_comp->desc_virt_addr, 0, FSL_QDMA_DESCRIPTOR_BUFFER_SIZE);
^~~~~~
drivers/dma/fsl-qdma.c:824:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(irq_name, "qdma-queue%d", i);
^~~~~~~
drivers/dma/fsl-qdma.c:824:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(irq_name, "qdma-queue%d", i);
^~~~~~~
drivers/dma/fsl-qdma.c:916:11: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
reg |= FSL_QDMA_BCQMR_CD_THLD(ilog2(temp->n_cq) - 4);
^
drivers/dma/fsl-qdma.c:80:40: note: expanded from macro 'FSL_QDMA_BCQMR_CD_THLD'
#define FSL_QDMA_BCQMR_CD_THLD(x) ((x) << 20)
^
drivers/dma/fsl-qdma.c:1128:6: note: 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:1128:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:1134:6: note: 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:1134:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:1140:6: note: 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:1140:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:1145:12: note: Assuming '__UNIQUE_ID___x230' is >= '__UNIQUE_ID___y231'
blk_num = min_t(int, blk_num, num_online_cpus());
^
include/linux/minmax.h:104:27: note: expanded from macro 'min_t'
#define min_t(type, x, y) __careful_cmp((type)(x), (type)(y), <)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
--
^
drivers/dma/fsl-qdma.c:1209:6: note: Assuming field 'irq_base' is >= 0
if (fsl_qdma->irq_base < 0)
^~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:1209:2: note: Taking false branch
if (fsl_qdma->irq_base < 0)
^
drivers/dma/fsl-qdma.c:1215:14: note: Assuming 'i' is >= field 'n_chans'
for (i = 0; i < fsl_qdma->n_chans; i++) {
^~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:1215:2: note: Loop condition is false. Execution continues on line 1225
for (i = 0; i < fsl_qdma->n_chans; i++) {
^
drivers/dma/fsl-qdma.c:1238:33: note: 40 is not equal to 64
ret = dma_set_mask(&pdev->dev, DMA_BIT_MASK(40));
^
include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^~~
drivers/dma/fsl-qdma.c:1238:33: note: '?' condition is false
ret = dma_set_mask(&pdev->dev, DMA_BIT_MASK(40));
^
include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^
drivers/dma/fsl-qdma.c:1239:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:1239:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:1247:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:1247:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:1253:8: note: Calling 'fsl_qdma_reg_init'
ret = fsl_qdma_reg_init(fsl_qdma);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:879:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/dma/fsl-qdma.c:879:2: note: Taking false branch
if (ret) {
^
drivers/dma/fsl-qdma.c:884:14: note: Assuming 'i' is < field 'block_number'
for (i = 0; i < fsl_qdma->block_number; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:884:2: note: Loop condition is true. Entering loop body
for (i = 0; i < fsl_qdma->block_number; i++) {
^
drivers/dma/fsl-qdma.c:884:14: note: Assuming 'i' is >= field 'block_number'
for (i = 0; i < fsl_qdma->block_number; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:884:2: note: Loop condition is false. Execution continues on line 896
for (i = 0; i < fsl_qdma->block_number; i++) {
^
drivers/dma/fsl-qdma.c:896:2: note: Loop condition is true. Entering loop body
for (j = 0; j < fsl_qdma->block_number; j++) {
^
drivers/dma/fsl-qdma.c:899:15: note: Assuming 'i' is >= field 'n_queues'
for (i = 0; i < fsl_qdma->n_queues; i++) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:899:3: note: Loop condition is false. Execution continues on line 927
for (i = 0; i < fsl_qdma->n_queues; i++) {
^
drivers/dma/fsl-qdma.c:953:33: note: '?' condition is false
reg |= FSL_QDMA_BSQMR_CQ_SIZE(ilog2
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
drivers/dma/fsl-qdma.c:953:33: note: '?' condition is true
reg |= FSL_QDMA_BSQMR_CQ_SIZE(ilog2
^
include/linux/log2.h:161:2: note: expanded from macro 'ilog2'
(sizeof(n) <= 4) ? \
^
drivers/dma/fsl-qdma.c:953:10: note: The result of the left shift is undefined because the left operand is negative
reg |= FSL_QDMA_BSQMR_CQ_SIZE(ilog2
^
drivers/dma/fsl-qdma.c:88:40: note: expanded from macro 'FSL_QDMA_BSQMR_CQ_SIZE'
#define FSL_QDMA_BSQMR_CQ_SIZE(x) ((x) << 16)
~~~ ^
drivers/dma/fsl-qdma.c:957:3: warning: Value stored to 'reg' is never read [clang-analyzer-deadcode.DeadStores]
reg = qdma_readl(fsl_qdma, block + FSL_QDMA_BSQMR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:957:3: note: Value stored to 'reg' is never read
reg = qdma_readl(fsl_qdma, block + FSL_QDMA_BSQMR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/fsl-qdma.c:1005:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fsl_queue->virt_head++,
^~~~~~
drivers/dma/fsl-qdma.c:1005:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fsl_queue->virt_head++,
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
>> drivers/tty/n_hdlc.c:418:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf->buf, data, count);
^~~~~~
drivers/tty/n_hdlc.c:418:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf->buf, data, count);
^~~~~~
drivers/tty/n_hdlc.c:507:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kbuf, rbuf->buf+offset, ret);
^~~~~~
drivers/tty/n_hdlc.c:507:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kbuf, rbuf->buf+offset, ret);
^~~~~~
drivers/tty/n_hdlc.c:581:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tbuf->buf, data, count);
^~~~~~
drivers/tty/n_hdlc.c:581:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tbuf->buf, data, count);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/char/hw_random/core.c:368:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(buf, PAGE_SIZE, "%s\n", rng ? rng->name : "none");
^~~~~~~~
drivers/char/hw_random/core.c:368:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(buf, PAGE_SIZE, "%s\n", rng ? rng->name : "none");
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/ufs/ialloc.c:145:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ufs/ialloc.c:145:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ufs/ialloc.c:302:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ufsi->i_u1, 0, sizeof(ufsi->i_u1));
^~~~~~
fs/ufs/ialloc.c:302:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ufsi->i_u1, 0, sizeof(ufsi->i_u1));
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
fs/ufs/inode.c:78:9: warning: Excessive padding in 'Indirect' (8 padding bytes, where 0 is optimal).
Optimal fields order:
,
p,
bh,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
typedef struct {
^~~~~~~~
fs/ufs/inode.c:78:9: note: Excessive padding in 'Indirect' (8 padding bytes, where 0 is optimal). Optimal fields order: , p, bh, consider reordering the fields or adding explicit padding members
typedef struct {
^~~~~~~~
fs/ufs/inode.c:596:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:596:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:643:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:643:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:646:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:646:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:746:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:746:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:750:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:750:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:755:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:755:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:786:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:786:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:789:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:789:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:794:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:794:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:1104:10: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ufs/inode.c:1104:10: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/media/tuners/tuner-xc2028.c:287:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:287:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
>> drivers/media/tuners/tuner-xc2028.c:321:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, p, sizeof(name) - 1);
^~~~~~
drivers/media/tuners/tuner-xc2028.c:321:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, p, sizeof(name) - 1);
^~~~~~
drivers/media/tuners/tuner-xc2028.c:631:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 1, p, len);
^~~~~~
drivers/media/tuners/tuner-xc2028.c:631:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 1, p, len);
^~~~~~
drivers/media/tuners/tuner-xc2028.c:769:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:769:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1037:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = send_seq(priv, {0x00, 0x00});
^
drivers/media/tuners/tuner-xc2028.c:1037:3: note: Value stored to 'rc' is never read
drivers/media/tuners/tuner-xc2028.c:1396:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->ctrl, p, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1396:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->ctrl, p, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1497:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &xc2028_dvb_tuner_ops,
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1497:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &xc2028_dvb_tuner_ops,
^~~~~~
Suppressed 46 warnings (44 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/video/fbdev/core/fbsysfs.c:121:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(&buf[offset], PAGE_SIZE - offset, "%c:%dx%d%c-%d\n",
^~~~~~~~
drivers/video/fbdev/core/fbsysfs.c:121:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(&buf[offset], PAGE_SIZE - offset, "%c:%dx%d%c-%d\n",
^~~~~~~~
drivers/video/fbdev/core/fbsysfs.c:137:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(var));
^~~~~~
drivers/video/fbdev/core/fbsysfs.c:137:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&var, 0, sizeof(var));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/video/fbdev/core/modedb.c:728:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:728:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/video/fbdev/core/fbcvt.c:227:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:227:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega "
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega "
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: warning: Value stored to 'cnt' is never read [clang-analyzer-deadcode.DeadStores]
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: note: Value stored to 'cnt' is never read
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: note: Value stored to 'offset' is never read
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt, 0, sizeof(cvt));
^~~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cvt, 0, sizeof(cvt));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/xfs/libxfs/xfs_ialloc_btree.c:103:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_ialloc_btree.c:103:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/media/dvb-frontends/dvb_dummy_fe.c:122:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops,
^~~~~~
drivers/media/dvb-frontends/dvb_dummy_fe.c:122:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops,
^~~~~~
drivers/media/dvb-frontends/dvb_dummy_fe.c:143:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops,
^~~~~~
drivers/media/dvb-frontends/dvb_dummy_fe.c:143:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops,
^~~~~~
drivers/media/dvb-frontends/dvb_dummy_fe.c:164:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops,
^~~~~~
drivers/media/dvb-frontends/dvb_dummy_fe.c:164:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops,
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
net/atm/signaling.c:82:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vcc->local.sas_addr.prv,
^~~~~~
net/atm/signaling.c:82:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vcc->local.sas_addr.prv,
^~~~~~
net/atm/signaling.c:84:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vcc->local.sas_addr.pub,
^~~~~~
net/atm/signaling.c:84:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vcc->local.sas_addr.pub,
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/atm/svc.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local,
^~~~~~
net/atm/svc.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local,
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/nilfs2/sufile.c:839:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(si, 0, sisz * n);
^~~~~~
fs/nilfs2/sufile.c:839:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(si, 0, sisz * n);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
>> fs/befs/datastream.c:150:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buff + bytes_read, bh->b_data, plen);
^~~~~~
fs/befs/datastream.c:150:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buff + bytes_read, bh->b_data, plen);
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
Suppressed 26 warnings (26 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
drivers/scsi/scsi_transport_sas.c:131:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_search(device_type, sas_device_type_names)
^
drivers/scsi/scsi_transport_sas.c:113:11: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:131:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_search(device_type, sas_device_type_names)
^
drivers/scsi/scsi_transport_sas.c:113:11: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:131:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_search(device_type, sas_device_type_names)
^
drivers/scsi/scsi_transport_sas.c:118:9: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:131:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_search(device_type, sas_device_type_names)
^
drivers/scsi/scsi_transport_sas.c:118:9: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:143:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_match(protocol, sas_protocol_names)
^
drivers/scsi/scsi_transport_sas.c:77:11: note: expanded from macro 'sas_bitfield_name_match'
len += sprintf(buf + len, "%s%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:143:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_match(protocol, sas_protocol_names)
^
drivers/scsi/scsi_transport_sas.c:77:11: note: expanded from macro 'sas_bitfield_name_match'
len += sprintf(buf + len, "%s%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:143:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_match(protocol, sas_protocol_names)
^
drivers/scsi/scsi_transport_sas.c:82:9: note: expanded from macro 'sas_bitfield_name_match'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:143:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_match(protocol, sas_protocol_names)
^
drivers/scsi/scsi_transport_sas.c:82:9: note: expanded from macro 'sas_bitfield_name_match'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:159:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_search(linkspeed, sas_linkspeed_names)
^
drivers/scsi/scsi_transport_sas.c:113:11: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:159:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_search(linkspeed, sas_linkspeed_names)
^
drivers/scsi/scsi_transport_sas.c:113:11: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "%s", \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:159:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sas_bitfield_name_search(linkspeed, sas_linkspeed_names)
^
drivers/scsi/scsi_transport_sas.c:118:9: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:159:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sas_bitfield_name_search(linkspeed, sas_linkspeed_names)
^
drivers/scsi/scsi_transport_sas.c:118:9: note: expanded from macro 'sas_bitfield_name_search'
len += sprintf(buf + len, "\n"); \
^~~~~~~
drivers/scsi/scsi_transport_sas.c:209:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "sas_host%d", shost->host_no);
^~~~~~~~
drivers/scsi/scsi_transport_sas.c:209:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "sas_host%d", shost->host_no);
--
fs/fuse/file.c:2887:2: note: Taking true branch
if (io->async) {
^
fs/fuse/file.c:2890:25: note: 'ret' is < 0
fuse_aio_complete(io, ret < 0 ? ret : 0, -1);
^~~
fs/fuse/file.c:2890:25: note: '?' condition is true
fs/fuse/file.c:2890:3: note: Calling 'fuse_aio_complete'
fuse_aio_complete(io, ret < 0 ? ret : 0, -1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/file.c:663:6: note: 'err' is -12
if (err)
^~~
fs/fuse/file.c:663:2: note: Taking true branch
if (err)
^
fs/fuse/file.c:664:13: note: '?' condition is true
io->err = io->err ? : err;
^
fs/fuse/file.c:669:6: note: Assuming 'left' is not equal to 0
if (!left && io->blocking)
^~~~~
fs/fuse/file.c:669:12: note: Left side of '&&' is false
if (!left && io->blocking)
^
fs/fuse/file.c:673:7: note: 'left' is not equal to 0
if (!left && !io->blocking) {
^~~~
fs/fuse/file.c:673:12: note: Left side of '&&' is false
if (!left && !io->blocking) {
^
fs/fuse/file.c:689:2: note: Calling 'kref_put'
kref_put(&io->refcnt, fuse_io_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:6: note: Assuming the condition is true
if (refcount_dec_and_test(&kref->refcount)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:2: note: Taking true branch
if (refcount_dec_and_test(&kref->refcount)) {
^
include/linux/kref.h:65:3: note: Calling 'fuse_io_release'
release(kref);
^~~~~~~~~~~~~
fs/fuse/file.c:628:2: note: Memory is released
kfree(container_of(kref, struct fuse_io_priv, refcnt));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:65:3: note: Returning; memory was released
release(kref);
^~~~~~~~~~~~~
fs/fuse/file.c:689:2: note: Returning; memory was released
kref_put(&io->refcnt, fuse_io_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/file.c:2890:3: note: Returning; memory was released via 1st parameter
fuse_aio_complete(io, ret < 0 ? ret : 0, -1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/file.c:2893:7: note: Assuming 'blocking' is true
if (!blocking)
^~~~~~~~~
fs/fuse/file.c:2893:3: note: Taking false branch
if (!blocking)
^
fs/fuse/file.c:2897:9: note: Use of memory after it is freed
ret = fuse_get_res_by_io(io);
^ ~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/mfd/pcf50633-core.c:104:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf1 += sprintf(buf1, "%*ph\n", (int)sizeof(dump), dump);
^~~~~~~
drivers/mfd/pcf50633-core.c:104:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf1 += sprintf(buf1, "%*ph\n", (int)sizeof(dump), dump);
^~~~~~~
drivers/mfd/pcf50633-core.c:117:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = sprintf(buf, "%02x%02x%02x%02x%02x\n",
^~~~~~~
drivers/mfd/pcf50633-core.c:117:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
n = sprintf(buf, "%02x%02x%02x%02x%02x\n",
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/video/fbdev/sm501fb.c:1169:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl ? "crt" : "panel");
^~~~~~~~
drivers/video/fbdev/sm501fb.c:1169:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl ? "crt" : "panel");
^~~~~~~~
>> drivers/video/fbdev/sm501fb.c:1230:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ptr += sprintf(ptr, "%08x = %08x\n", reg,
^~~~~~~
drivers/video/fbdev/sm501fb.c:1230:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ptr += sprintf(ptr, "%08x = %08x\n", reg,
^~~~~~~
>> drivers/video/fbdev/sm501fb.c:1724:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&par->ops,
^~~~~~
drivers/video/fbdev/sm501fb.c:1724:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&par->ops,
^~~~~~
drivers/video/fbdev/sm501fb.c:1965:5: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(fb_mode, cp);
^~~~~~
drivers/video/fbdev/sm501fb.c:1965:5: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(fb_mode, cp);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
88 warnings generated.
>> drivers/video/fbdev/uvesafb.c:103:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&task->t, utask, sizeof(*utask));
^~~~~~
drivers/video/fbdev/uvesafb.c:103:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&task->t, utask, sizeof(*utask));
^~~~~~
drivers/video/fbdev/uvesafb.c:106:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(task->buf, utask + 1, task->t.buf_len);
^~~~~~
drivers/video/fbdev/uvesafb.c:106:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(task->buf, utask + 1, task->t.buf_len);
^~~~~~
drivers/video/fbdev/uvesafb.c:167:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&m->id, &uvesafb_cn_id, sizeof(m->id));
^~~~~~
drivers/video/fbdev/uvesafb.c:167:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&m->id, &uvesafb_cn_id, sizeof(m->id));
^~~~~~
drivers/video/fbdev/uvesafb.c:173:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m + 1, &task->t, sizeof(task->t));
^~~~~~
drivers/video/fbdev/uvesafb.c:173:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m + 1, &task->t, sizeof(task->t));
^~~~~~
drivers/video/fbdev/uvesafb.c:176:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)(m + 1) + sizeof(task->t), task->buf, task->t.buf_len);
^~~~~~
drivers/video/fbdev/uvesafb.c:176:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8 *)(m + 1) + sizeof(task->t), task->buf, task->t.buf_len);
^~~~~~
>> drivers/video/fbdev/uvesafb.c:250:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(task, 0, sizeof(*task));
^~~~~~
drivers/video/fbdev/uvesafb.c:250:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(task, 0, sizeof(*task));
^~~~~~
drivers/video/fbdev/uvesafb.c:426:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(par->vbe_ib.vbe_signature, "VBE2", 4);
^~~~~~
drivers/video/fbdev/uvesafb.c:426:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(par->vbe_ib.vbe_signature, "VBE2", 4);
^~~~~~
drivers/video/fbdev/uvesafb.c:682:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->monspecs, 0, sizeof(info->monspecs));
^~~~~~
drivers/video/fbdev/uvesafb.c:682:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->monspecs, 0, sizeof(info->monspecs));
^~~~~~
drivers/video/fbdev/uvesafb.c:729:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(var));
^~~~~~
drivers/video/fbdev/uvesafb.c:729:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&var, 0, sizeof(var));
^~~~~~
drivers/video/fbdev/uvesafb.c:1271:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&par->crtc, crtc, sizeof(*crtc));
^~~~~~
drivers/video/fbdev/uvesafb.c:1271:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&par->crtc, crtc, sizeof(*crtc));
^~~~~~
drivers/video/fbdev/uvesafb.c:1273:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&par->crtc, 0, sizeof(*crtc));
^~~~~~
drivers/video/fbdev/uvesafb.c:1273:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&par->crtc, 0, sizeof(*crtc));
^~~~~~
>> drivers/video/fbdev/uvesafb.c:1552:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%.4x\n", par->vbe_ib.vbe_version);
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1552:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%.4x\n", par->vbe_ib.vbe_version);
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1583:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1583:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1598:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1598:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1613:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1613:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", (char *)
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1628:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n",
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1628:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n",
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1642:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%d\n", par->nocrtc);
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1642:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%d\n", par->nocrtc);
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1870:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", v86d_path);
^~~~~~~~
drivers/video/fbdev/uvesafb.c:1870:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", v86d_path);
^~~~~~~~
>> drivers/video/fbdev/uvesafb.c:1876:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(v86d_path, buf, PATH_MAX - 1);
^~~~~~~
drivers/video/fbdev/uvesafb.c:1876:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(v86d_path, buf, PATH_MAX - 1);
^~~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/power/supply/bq2515x_charger.c:1095:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(bq2515x->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
drivers/power/supply/bq2515x_charger.c:1095:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(bq2515x->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/joystick/spaceorb.c:159:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(spaceorb->phys, sizeof(spaceorb->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/joystick/spaceorb.c:159:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(spaceorb->phys, sizeof(spaceorb->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/joystick/warrior.c:136:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(warrior->phys, sizeof(warrior->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/joystick/warrior.c:136:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(warrior->phys, sizeof(warrior->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
kernel/watch_queue.c:105:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p + offset, n, len);
^~~~~~
kernel/watch_queue.c:105:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p + offset, n, len);
^~~~~~
kernel/watch_queue.c:267:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bitmap, 0xff, bmsize);
^~~~~~
kernel/watch_queue.c:267:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bitmap, 0xff, bmsize);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
fs/cachefiles/io.c:105:7: note: 'off2' is equal to 0
if (off2 == 0)
^~~~
fs/cachefiles/io.c:105:3: note: Taking true branch
if (off2 == 0)
^
fs/cachefiles/io.c:107:7: note: Assuming 'off2' is < 0
if (off2 < 0 && off2 >= (loff_t)-MAX_ERRNO && off2 != -ENXIO) {
^~~~~~~~
fs/cachefiles/io.c:107:7: note: Left side of '&&' is true
fs/cachefiles/io.c:107:19: note: Assuming the condition is false
if (off2 < 0 && off2 >= (loff_t)-MAX_ERRNO && off2 != -ENXIO) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:107:46: note: Left side of '&&' is false
if (off2 < 0 && off2 >= (loff_t)-MAX_ERRNO && off2 != -ENXIO) {
^
fs/cachefiles/io.c:113:7: note: Left side of '||' is false
if (off2 == -ENXIO || off2 >= start_pos + len) {
^
fs/cachefiles/io.c:113:25: note: Assuming the condition is false
if (off2 == -ENXIO || off2 >= start_pos + len) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:113:3: note: Taking false branch
if (off2 == -ENXIO || off2 >= start_pos + len) {
^
fs/cachefiles/io.c:134:6: note: Assuming 'ki' is non-null
if (!ki)
^~~
fs/cachefiles/io.c:134:2: note: Taking false branch
if (!ki)
^
fs/cachefiles/io.c:150:6: note: Assuming field 'term_func' is non-null
if (ki->term_func)
^~~~~~~~~~~~~
fs/cachefiles/io.c:150:2: note: Taking true branch
if (ki->term_func)
^
fs/cachefiles/io.c:159:6: note: 'ret' is equal to 0
if (ret == 0)
^~~
fs/cachefiles/io.c:159:2: note: Taking true branch
if (ret == 0)
^
fs/cachefiles/io.c:162:2: note: Control jumps to the 'default' case at line 175
switch (ret) {
^
fs/cachefiles/io.c:177:3: note: Calling 'cachefiles_read_complete'
cachefiles_read_complete(&ki->iocb, ret);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:50:2: note: Taking false branch
_enter("%ld", ret);
^
fs/cachefiles/internal.h:344:26: note: expanded from macro '_enter'
#define _enter(FMT, ...) no_printk("==> %s("FMT")", __func__, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/cachefiles/io.c:52:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
fs/cachefiles/io.c:52:2: note: Taking false branch
if (ret < 0)
^
fs/cachefiles/io.c:56:6: note: Assuming field 'term_func' is null
if (ki->term_func) {
^~~~~~~~~~~~~
fs/cachefiles/io.c:56:2: note: Taking false branch
if (ki->term_func) {
^
fs/cachefiles/io.c:67:2: note: Calling 'cachefiles_put_kiocb'
cachefiles_put_kiocb(ki);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:35:2: note: Taking true branch
if (refcount_dec_and_test(&ki->ki_refcnt)) {
^
fs/cachefiles/io.c:38:3: note: Memory is released
kfree(ki);
^~~~~~~~~
fs/cachefiles/io.c:67:2: note: Returning; memory was released
cachefiles_put_kiocb(ki);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:177:3: note: Returning; memory was released
cachefiles_read_complete(&ki->iocb, ret);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/cachefiles/io.c:178:7: note: Assuming 'ret' is <= 0
if (ret > 0)
^~~~~~~
fs/cachefiles/io.c:178:3: note: Taking false branch
if (ret > 0)
^
fs/cachefiles/io.c:180:3: note: Execution continues on line 184
break;
^
fs/cachefiles/io.c:184:2: note: Use of memory after it is freed
cachefiles_put_kiocb(ki);
^ ~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> drivers/dma/idma64.c:406:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&idma64c->config, config, sizeof(idma64c->config));
^~~~~~
drivers/dma/idma64.c:406:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&idma64c->config, config, sizeof(idma64c->config));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/virtio/virtio.c:17:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%04x\n", dev->id.device);
^~~~~~~
drivers/virtio/virtio.c:17:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%04x\n", dev->id.device);
^~~~~~~
drivers/virtio/virtio.c:25:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%04x\n", dev->id.vendor);
^~~~~~~
drivers/virtio/virtio.c:25:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%04x\n", dev->id.vendor);
^~~~~~~
drivers/virtio/virtio.c:33:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%08x\n", dev->config->get_status(dev));
^~~~~~~
drivers/virtio/virtio.c:33:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%08x\n", dev->config->get_status(dev));
^~~~~~~
drivers/virtio/virtio.c:41:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "virtio:d%08Xv%08X\n",
^~~~~~~
drivers/virtio/virtio.c:41:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "virtio:d%08Xv%08X\n",
^~~~~~~
drivers/virtio/virtio.c:56:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf+len, "%c",
^~~~~~~
drivers/virtio/virtio.c:56:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf+len, "%c",
^~~~~~~
drivers/virtio/virtio.c:58:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf+len, "\n");
^~~~~~~
drivers/virtio/virtio.c:58:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf+len, "\n");
^~~~~~~
drivers/virtio/virtio.c:362:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(compat, sizeof(compat), "virtio,device%x", dev->id.device);
^~~~~~~~
drivers/virtio/virtio.c:362:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(compat, sizeof(compat), "virtio,device%x", dev->id.device);
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/char/hw_random/ixp4xx-rng.c:44:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &pdev->dev;
^~~ ~~~~~~~~~~
drivers/char/hw_random/ixp4xx-rng.c:44:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &pdev->dev;
^~~ ~~~~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/jffs2/gc.c:812:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ri, 0, sizeof(ri));
^~~~~~
fs/jffs2/gc.c:812:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ri, 0, sizeof(ri));
^~~~~~
fs/jffs2/gc.c:1026:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ri, 0, sizeof(ri));
^~~~~~
fs/jffs2/gc.c:1026:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ri, 0, sizeof(ri));
^~~~~~
fs/jffs2/gc.c:1177:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ri, 0, sizeof(ri));
^~~~~~
fs/jffs2/gc.c:1177:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ri, 0, sizeof(ri));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^~~~~~~~~~~~
fs/fuse/control.c:170:8: note: Calling 'fuse_conn_limit_write'
ret = fuse_conn_limit_write(file, buf, count, ppos, &val,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/control.c:84:6: note: Assuming the condition is false
if (*ppos)
^~~~~
fs/fuse/control.c:84:2: note: Taking false branch
if (*ppos)
^
fs/fuse/control.c:88:6: note: Assuming 'err' is not equal to 0
if (err)
^~~
fs/fuse/control.c:88:2: note: Taking true branch
if (err)
^
fs/fuse/control.c:89:3: note: Returning without writing to '*val'
return err;
^
fs/fuse/control.c:170:8: note: Returning from 'fuse_conn_limit_write'
ret = fuse_conn_limit_write(file, buf, count, ppos, &val,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/control.c:172:6: note: Assuming 'ret' is > 0
if (ret <= 0)
^~~~~~~~
fs/fuse/control.c:172:2: note: Taking false branch
if (ret <= 0)
^
fs/fuse/control.c:174:7: note: Calling 'fuse_ctl_file_conn_get'
fc = fuse_ctl_file_conn_get(file);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/control.c:28:6: note: Assuming 'fc' is non-null
if (fc)
^~
fs/fuse/control.c:28:2: note: Taking true branch
if (fc)
^
fs/fuse/control.c:31:2: note: Returning pointer (loaded from 'fc'), which participates in a condition later
return fc;
^~~~~~~~~
fs/fuse/control.c:174:7: note: Returning from 'fuse_ctl_file_conn_get'
fc = fuse_ctl_file_conn_get(file);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fuse/control.c:175:6: note: Assuming 'fc' is non-null
if (!fc)
^~~
fs/fuse/control.c:175:2: note: Taking false branch
if (!fc)
^
fs/fuse/control.c:180:27: note: Assigned value is garbage or undefined
fc->congestion_threshold = val;
^ ~~~
fs/fuse/control.c:283:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%u", fc->dev);
^~~~~~~
fs/fuse/control.c:283:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%u", fc->dev);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
lib/zlib_deflate/deflate.c:441:21: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CLEAR_HASH(s); /* forget history */
^
lib/zlib_deflate/deflate.c:185:5: note: expanded from macro 'CLEAR_HASH'
memset((char *)s->head, 0, (unsigned)(s->hash_size-1)*sizeof(*s->head));
^~~~~~
lib/zlib_deflate/deflate.c:441:21: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CLEAR_HASH(s); /* forget history */
^
lib/zlib_deflate/deflate.c:185:5: note: expanded from macro 'CLEAR_HASH'
memset((char *)s->head, 0, (unsigned)(s->hash_size-1)*sizeof(*s->head));
^~~~~~
lib/zlib_deflate/deflate.c:513:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, strm->next_in, len);
^~~~~~
lib/zlib_deflate/deflate.c:513:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, strm->next_in, len);
^~~~~~
lib/zlib_deflate/deflate.c:529:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CLEAR_HASH(s);
^
lib/zlib_deflate/deflate.c:185:5: note: expanded from macro 'CLEAR_HASH'
memset((char *)s->head, 0, (unsigned)(s->hash_size-1)*sizeof(*s->head));
^~~~~~
lib/zlib_deflate/deflate.c:529:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CLEAR_HASH(s);
^
lib/zlib_deflate/deflate.c:185:5: note: expanded from macro 'CLEAR_HASH'
memset((char *)s->head, 0, (unsigned)(s->hash_size-1)*sizeof(*s->head));
^~~~~~
lib/zlib_deflate/deflate.c:764:13: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)s->window, (char *)s->window+wsize,
^~~~~~
lib/zlib_deflate/deflate.c:764:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)s->window, (char *)s->window+wsize,
^~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/affs/super.c:459:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig, boot_bh->b_data, 4);
^~~~~~
fs/affs/super.c:459:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig, boot_bh->b_data, 4);
^~~~~~
fs/affs/super.c:572:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(volume, sbi->s_volume, 32);
^~~~~~
fs/affs/super.c:572:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(volume, sbi->s_volume, 32);
^~~~~~
fs/affs/super.c:592:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sbi->s_volume, volume, 32);
^~~~~~
fs/affs/super.c:592:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sbi->s_volume, volume, 32);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/affs/namei.c:22:34: warning: Although the value stored to 'ch' is used in the enclosing expression, the value is never actually read from 'ch' [clang-analyzer-deadcode.DeadStores]
return ch >= 'a' && ch <= 'z' ? ch -= ('a' - 'A') : ch;
^ ~~~~~~~~~~~
fs/affs/namei.c:22:34: note: Although the value stored to 'ch' is used in the enclosing expression, the value is never actually read from 'ch'
return ch >= 'a' && ch <= 'z' ? ch -= ('a' - 'A') : ch;
^ ~~~~~~~~~~~
fs/affs/namei.c:489:2: warning: Value stored to 'retval' is never read [clang-analyzer-deadcode.DeadStores]
retval = affs_insert_hash(new_dir, bh_old);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/affs/namei.c:489:2: note: Value stored to 'retval' is never read
retval = affs_insert_hash(new_dir, bh_old);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
>> drivers/i2c/busses/i2c-cros-ec-tunnel.c:99:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out_data, i2c_msg->buf, msg->len);
^~~~~~
drivers/i2c/busses/i2c-cros-ec-tunnel.c:99:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out_data, i2c_msg->buf, msg->len);
^~~~~~
drivers/i2c/busses/i2c-cros-ec-tunnel.c:166:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(i2c_msg->buf, in_data, i2c_msg->len);
^~~~~~
drivers/i2c/busses/i2c-cros-ec-tunnel.c:166:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(i2c_msg->buf, in_data, i2c_msg->len);
^~~~~~
Suppressed 50 warnings (43 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/i2c/muxes/i2c-mux-gpio.c:140:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mux->data, dev_get_platdata(&pdev->dev),
^~~~~~
drivers/i2c/muxes/i2c-mux-gpio.c:140:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mux->data, dev_get_platdata(&pdev->dev),
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/md/dm-verity-fec.c:350:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fio->bufs[n], 0, v->fec->rsn << DM_VERITY_FEC_BUF_RS_BITS);
^~~~~~
drivers/md/dm-verity-fec.c:350:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fio->bufs[n], 0, v->fec->rsn << DM_VERITY_FEC_BUF_RS_BITS);
^~~~~~
drivers/md/dm-verity-fec.c:352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fio->erasures, 0, sizeof(fio->erasures));
^~~~~~
drivers/md/dm-verity-fec.c:352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fio->erasures, 0, sizeof(fio->erasures));
^~~~~~
drivers/md/dm-verity-fec.c:408:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &fio->output[fio->output_pos], len);
^~~~~~
drivers/md/dm-verity-fec.c:408:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &fio->output[fio->output_pos], len);
^~~~~~
drivers/md/dm-verity-fec.c:471:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, fio->output, 1 << v->data_dev_block_bits);
^~~~~~
drivers/md/dm-verity-fec.c:471:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, fio->output, 1 << v->data_dev_block_bits);
^~~~~~
drivers/md/dm-verity-fec.c:516:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fio->bufs, 0, sizeof(fio->bufs));
^~~~~~
drivers/md/dm-verity-fec.c:516:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fio->bufs, 0, sizeof(fio->bufs));
^~~~~~
drivers/md/dm-verity-fec.c:617:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(arg_value, "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-fec.c:617:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(arg_value, "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-fec.c:626:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(arg_value, "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-fec.c:626:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(arg_value, "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-fec.c:635:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(arg_value, "%hhu%c", &num_c, &dummy) != 1 || !num_c ||
^~~~~~
drivers/md/dm-verity-fec.c:635:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(arg_value, "%hhu%c", &num_c, &dummy) != 1 || !num_c ||
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
drivers/leds/trigger/ledtrig-oneshot.c:43:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", oneshot_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-oneshot.c:43:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", oneshot_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-oneshot.c:73:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", led_cdev->blink_delay_on);
^~~~~~~
drivers/leds/trigger/ledtrig-oneshot.c:73:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", led_cdev->blink_delay_on);
^~~~~~~
drivers/leds/trigger/ledtrig-oneshot.c:97:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", led_cdev->blink_delay_off);
^~~~~~~
drivers/leds/trigger/ledtrig-oneshot.c:97:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", led_cdev->blink_delay_off);
^~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^
fs/ext4/fsmap.c:441:7: note: 'error' is 0
if (error)
^~~~~
fs/ext4/fsmap.c:441:3: note: Taking false branch
if (error)
^
fs/ext4/fsmap.c:449:7: note: 'error' is -12
if (error)
^~~~~
fs/ext4/fsmap.c:449:3: note: Taking true branch
if (error)
^
fs/ext4/fsmap.c:450:4: note: Control jumps to line 461
goto err;
^
fs/ext4/fsmap.c:461:2: note: Calling 'ext4_getfsmap_free_fixed_metadata'
ext4_getfsmap_free_fixed_metadata(meta_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/fsmap.c:401:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(p, tmp, meta_list, fmr_list) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
fs/ext4/fsmap.c:403:3: note: Memory is released
kfree(p);
^~~~~~~~
fs/ext4/fsmap.c:401:2: note: Loop condition is false. Execution continues on line 401
list_for_each_entry_safe(p, tmp, meta_list, fmr_list) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
fs/ext4/fsmap.c:461:2: note: Returning; memory was released
ext4_getfsmap_free_fixed_metadata(meta_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/fsmap.c:508:10: note: Returning; memory was released
error = ext4_getfsmap_find_fixed_metadata(sb, &info->gfi_meta_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/fsmap.c:509:6: note: 'error' is -12
if (error)
^~~~~
fs/ext4/fsmap.c:509:2: note: Taking true branch
if (error)
^
fs/ext4/fsmap.c:510:3: note: Control jumps to line 566
goto err;
^
fs/ext4/fsmap.c:566:2: note: Calling 'ext4_getfsmap_free_fixed_metadata'
ext4_getfsmap_free_fixed_metadata(&info->gfi_meta_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/fsmap.c:401:2: note: Use of memory after it is freed
list_for_each_entry_safe(p, tmp, meta_list, fmr_list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
fs/ext4/fsmap.c:505:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->gfi_high, 0xFF, sizeof(info->gfi_high));
^~~~~~
fs/ext4/fsmap.c:505:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->gfi_high, 0xFF, sizeof(info->gfi_high));
^~~~~~
fs/ext4/fsmap.c:549:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->gfi_low, 0, sizeof(info->gfi_low));
^~~~~~
fs/ext4/fsmap.c:549:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->gfi_low, 0, sizeof(info->gfi_low));
^~~~~~
fs/ext4/fsmap.c:645:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(handlers, 0, sizeof(handlers));
^~~~~~
fs/ext4/fsmap.c:645:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(handlers, 0, sizeof(handlers));
^~~~~~
fs/ext4/fsmap.c:672:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dkeys[1], 0xFF, sizeof(struct ext4_fsmap));
^~~~~~
fs/ext4/fsmap.c:672:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dkeys[1], 0xFF, sizeof(struct ext4_fsmap));
^~~~~~
fs/ext4/fsmap.c:703:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dkeys[0], 0, sizeof(struct ext4_fsmap));
^~~~~~
fs/ext4/fsmap.c:703:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dkeys[0], 0, sizeof(struct ext4_fsmap));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> drivers/platform/chrome/cros_ec.c:116:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buf, 0, sizeof(buf));
^~~~~~
drivers/platform/chrome/cros_ec.c:116:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buf, 0, sizeof(buf));
^~~~~~
Suppressed 50 warnings (43 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/platform/chrome/cros_ec_i2c.c:91:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = cros_ec_prepare_tx(ec_dev, msg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/platform/chrome/cros_ec_i2c.c:91:2: note: Value stored to 'ret' is never read
ret = cros_ec_prepare_tx(ec_dev, msg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/platform/chrome/cros_ec_i2c.c:158:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->data,
^~~~~~
drivers/platform/chrome/cros_ec_i2c.c:158:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->data,
^~~~~~
Suppressed 51 warnings (43 in non-user code, 8 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/media/dvb-core/dvb_demux.c:96:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(d, s, len);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:96:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(d, s, len);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:550:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&demux->tsbuf[i], buf, count);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:550:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&demux->tsbuf[i], buf, count);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:554:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&demux->tsbuf[i], buf, j);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:554:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&demux->tsbuf[i], buf, j);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:571:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(demux->tsbuf, q, 188);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:571:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(demux->tsbuf, q, 188);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:581:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(demux->tsbuf, &buf[p], i);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:581:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(demux->tsbuf, &buf[p], i);
^~~~~~
drivers/media/dvb-core/dvb_demux.c:1230:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pids, dvbdemux->pids, 5 * sizeof(u16));
^~~~~~
drivers/media/dvb-core/dvb_demux.c:1230:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pids, dvbdemux->pids, 5 * sizeof(u16));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/android/binder_alloc.c:52:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
return list_entry(buffer->entry.next, struct binder_buffer, entry);
^
drivers/android/binder_alloc.c:820:2: note: Assuming field 'vma' is null
BUG_ON(alloc->vma);
^
include/asm-generic/bug.h:65:36: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/android/binder_alloc.c:820:2: note: Taking false branch
BUG_ON(alloc->vma);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/android/binder_alloc.c:820:2: note: Loop condition is false. Exiting loop
BUG_ON(alloc->vma);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/android/binder_alloc.c:822:2: note: Loop condition is true. Entering loop body
while ((n = rb_first(&alloc->allocated_buffers))) {
^
drivers/android/binder_alloc.c:826:3: note: Assuming field 'transaction' is null
BUG_ON(buffer->transaction);
^
include/asm-generic/bug.h:65:36: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/android/binder_alloc.c:826:3: note: Taking false branch
BUG_ON(buffer->transaction);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/android/binder_alloc.c:826:3: note: Loop condition is false. Exiting loop
BUG_ON(buffer->transaction);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/android/binder_alloc.c:828:7: note: Assuming field 'clear_on_free' is 0
if (buffer->clear_on_free) {
^~~~~~~~~~~~~~~~~~~~~
drivers/android/binder_alloc.c:828:3: note: Taking false branch
if (buffer->clear_on_free) {
--
^~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/android/binder_alloc.c:842:3: note: Left side of '&&' is false
WARN_ON_ONCE(!list_empty(&alloc->buffers));
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:30: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
drivers/android/binder_alloc.c:842:3: note: Taking false branch
WARN_ON_ONCE(!list_empty(&alloc->buffers));
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:3: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
drivers/android/binder_alloc.c:843:3: note: Memory is released
kfree(buffer);
^~~~~~~~~~~~~
drivers/android/binder_alloc.c:836:2: note: Loop condition is true. Entering loop body
while (!list_empty(&alloc->buffers)) {
^
drivers/android/binder_alloc.c:839:12: note: Use of memory after it is freed
WARN_ON(!buffer->free);
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/android/binder_alloc.c:1188:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kptr, 0, size);
^~~~~~
drivers/android/binder_alloc.c:1188:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kptr, 0, size);
^~~~~~
drivers/android/binder_alloc.c:1263:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmpptr, ptr, size);
^~~~~~
drivers/android/binder_alloc.c:1263:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmpptr, ptr, size);
^~~~~~
drivers/android/binder_alloc.c:1265:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, tmpptr, size);
^~~~~~
drivers/android/binder_alloc.c:1265:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, tmpptr, size);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/leds/leds-netxbig.c:265:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", led_dat->sata);
^~~~~~~
drivers/leds/leds-netxbig.c:265:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", led_dat->sata);
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/leds/leds-ns2.c:164:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", led->sata);
^~~~~~~
drivers/leds/leds-ns2.c:164:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", led->sata);
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
>> drivers/platform/chrome/cros_ec_chardev.c:72:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, maxlen,
^~~~~~~~
drivers/platform/chrome/cros_ec_chardev.c:72:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, maxlen,
^~~~~~~~
drivers/platform/chrome/cros_ec_chardev.c:82:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, maxlen, "%s\n%s\n%s\n%s\n", CROS_EC_DEV_VERSION,
^~~~~~~~
drivers/platform/chrome/cros_ec_chardev.c:82:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, maxlen, "%s\n%s\n%s\n%s\n", CROS_EC_DEV_VERSION,
^~~~~~~~
>> drivers/platform/chrome/cros_ec_chardev.c:113:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(event->data, &ec_dev->event_data.data, ec_dev->event_size);
^~~~~~
drivers/platform/chrome/cros_ec_chardev.c:113:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(event->data, &ec_dev->event_data.data, ec_dev->event_size);
^~~~~~
Suppressed 34 warnings (27 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
drivers/mtd/inftlcore.c:250:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(BlockMap, 0xff, sizeof(BlockMap));
^~~~~~
drivers/mtd/inftlcore.c:250:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(BlockMap, 0xff, sizeof(BlockMap));
^~~~~~
drivers/mtd/inftlcore.c:251:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(BlockDeleted, 0, sizeof(BlockDeleted));
^~~~~~
drivers/mtd/inftlcore.c:251:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(BlockDeleted, 0, sizeof(BlockDeleted));
^~~~~~
drivers/mtd/inftlcore.c:347:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&oob, 0xff, sizeof(struct inftl_oob));
^~~~~~
drivers/mtd/inftlcore.c:347:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&oob, 0xff, sizeof(struct inftl_oob));
^~~~~~
drivers/mtd/inftlcore.c:537:4: warning: Value stored to 'thisEUN' is never read [clang-analyzer-deadcode.DeadStores]
thisEUN = INFTL_makefreeblock(inftl, block);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/inftlcore.c:537:4: note: Value stored to 'thisEUN' is never read
thisEUN = INFTL_makefreeblock(inftl, block);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/inftlcore.c:638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(BlockUsed, 0, sizeof(BlockUsed));
^~~~~~
drivers/mtd/inftlcore.c:638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(BlockUsed, 0, sizeof(BlockUsed));
^~~~~~
drivers/mtd/inftlcore.c:639:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(BlockDeleted, 0, sizeof(BlockDeleted));
^~~~~~
drivers/mtd/inftlcore.c:639:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(BlockDeleted, 0, sizeof(BlockDeleted));
^~~~~~
drivers/mtd/inftlcore.c:835:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&oob, 0xff, sizeof(struct inftl_oob));
^~~~~~
drivers/mtd/inftlcore.c:835:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&oob, 0xff, sizeof(struct inftl_oob));
^~~~~~
drivers/mtd/inftlcore.c:903:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, SECTORSIZE);
^~~~~~
drivers/mtd/inftlcore.c:903:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, SECTORSIZE);
^~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
drivers/leds/trigger/ledtrig-activity.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-activity.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
drivers/hid/hid-gembird.c:80:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_rdesc + delta_size, rdesc, *rsize);
^~~~~~
drivers/hid/hid-gembird.c:80:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_rdesc + delta_size, rdesc, *rsize);
^~~~~~
drivers/hid/hid-gembird.c:83:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_rdesc, rdesc, GEMBIRD_START_FAULTY_RDESC);
^~~~~~
drivers/hid/hid-gembird.c:83:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_rdesc, rdesc, GEMBIRD_START_FAULTY_RDESC);
^~~~~~
drivers/hid/hid-gembird.c:86:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_rdesc + GEMBIRD_START_FAULTY_RDESC,
--
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
fs/bfs/inode.c:187:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(di, 0, sizeof(struct bfs_inode));
^~~~~~
fs/bfs/inode.c:187:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(di, 0, sizeof(struct bfs_inode));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/bfs/file.c:42:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new->b_data, bh->b_data, bh->b_size);
^~~~~~
fs/bfs/file.c:42:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new->b_data, bh->b_data, bh->b_size);
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/bfs/dir.c:228:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = -EPERM;
^ ~~~~~~
fs/bfs/dir.c:228:2: note: Value stored to 'error' is never read
error = -EPERM;
^ ~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/hfs/bfind.c:123:2: warning: Value stored to 'res' is never read [clang-analyzer-deadcode.DeadStores]
res = 0;
^ ~
fs/hfs/bfind.c:123:2: note: Value stored to 'res' is never read
res = 0;
^ ~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> fs/hfs/bnode.c:37:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + bytes_read, vaddr + off, bytes_to_read);
^~~~~~
fs/hfs/bnode.c:37:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + bytes_read, vaddr + off, bytes_to_read);
^~~~~~
fs/hfs/bnode.c:50:9: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
return be16_to_cpu(data);
^
include/linux/byteorder/generic.h:97:21: note: expanded from macro 'be16_to_cpu'
#define be16_to_cpu __be16_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:43:26: note: expanded from macro '__be16_to_cpu'
#define __be16_to_cpu(x) __swab16((__force __u16)(__be16)(x))
^
include/uapi/linux/swab.h:102:28: note: expanded from macro '__swab16'
#define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
^
fs/hfs/bnode.c:193:6: note: Assuming field 'prev' is not equal to 0
if (node->prev) {
^~~~~~~~~~
fs/hfs/bnode.c:193:2: note: Taking true branch
if (node->prev) {
^
fs/hfs/bnode.c:194:9: note: Calling 'hfs_bnode_find'
tmp = hfs_bnode_find(tree, node->prev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:336:6: note: Assuming 'node' is null
if (node) {
^~~~
fs/hfs/bnode.c:336:2: note: Taking false branch
if (node) {
^
fs/hfs/bnode.c:346:6: note: Assuming 'node' is non-null
if (!node)
^~~~~
fs/hfs/bnode.c:346:2: note: Taking false branch
if (!node)
^
fs/hfs/bnode.c:348:6: note: Assuming the condition is false
if (test_bit(HFS_BNODE_ERROR, &node->flags))
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
fs/hfs/bnode.c:348:2: note: Taking false branch
if (test_bit(HFS_BNODE_ERROR, &node->flags))
^
fs/hfs/bnode.c:350:6: note: Assuming the condition is false
if (!test_bit(HFS_BNODE_NEW, &node->flags))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:350:2: note: Taking false branch
if (!test_bit(HFS_BNODE_NEW, &node->flags))
^
fs/hfs/bnode.c:361:2: note: Control jumps to 'case 255:' at line 367
switch (node->type) {
^
fs/hfs/bnode.c:368:7: note: Assuming field 'height' is equal to 1
if (node->height != 1)
^~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:368:3: note: Taking false branch
if (node->height != 1)
^
fs/hfs/bnode.c:370:3: note: Execution continues on line 379
break;
^
fs/hfs/bnode.c:380:8: note: Calling 'hfs_bnode_read_u16'
off = hfs_bnode_read_u16(node, rec_off);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:47:2: note: 'data' declared without an initial value
__be16 data;
^~~~~~~~~~~
fs/hfs/bnode.c:49:2: note: Calling 'hfs_bnode_read'
hfs_bnode_read(node, &data, off, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:30:2: note: Loop condition is true. Entering loop body
for (bytes_read = 0; bytes_read < len; bytes_read += bytes_to_read) {
^
fs/hfs/bnode.c:31:7: note: Assuming 'pagenum' is >= field 'pages_per_bnode'
if (pagenum >= node->tree->pages_per_bnode)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:31:3: note: Taking true branch
if (pagenum >= node->tree->pages_per_bnode)
^
fs/hfs/bnode.c:32:4: note: Execution continues on line 31
break;
^
fs/hfs/bnode.c:43:1: note: Returning without writing to '*buf'
}
^
fs/hfs/bnode.c:49:2: note: Returning from 'hfs_bnode_read'
hfs_bnode_read(node, &data, off, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:50:9: note: 1st function call argument is an uninitialized value
return be16_to_cpu(data);
^
include/linux/byteorder/generic.h:97:21: note: expanded from macro 'be16_to_cpu'
#define be16_to_cpu __be16_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:43:26: note: expanded from macro '__be16_to_cpu'
#define __be16_to_cpu(x) __swab16((__force __u16)(__be16)(x))
--
if (test_bit(HFS_BNODE_ERROR, &node->flags))
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
fs/hfs/bnode.c:348:2: note: Taking false branch
if (test_bit(HFS_BNODE_ERROR, &node->flags))
^
fs/hfs/bnode.c:350:6: note: Assuming the condition is false
if (!test_bit(HFS_BNODE_NEW, &node->flags))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:350:2: note: Taking false branch
if (!test_bit(HFS_BNODE_NEW, &node->flags))
^
fs/hfs/bnode.c:361:2: note: Control jumps to 'case 0:' at line 371
switch (node->type) {
^
fs/hfs/bnode.c:372:7: note: Assuming field 'height' is > 1
if (node->height <= 1 || node->height > tree->depth)
^~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:372:7: note: Left side of '||' is false
fs/hfs/bnode.c:372:28: note: Assuming field 'height' is <= field 'depth'
if (node->height <= 1 || node->height > tree->depth)
^~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:372:3: note: Taking false branch
if (node->height <= 1 || node->height > tree->depth)
^
fs/hfs/bnode.c:374:3: note: Execution continues on line 379
break;
^
fs/hfs/bnode.c:381:6: note: Assuming the condition is false
if (off != sizeof(struct hfs_bnode_desc))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:381:2: note: Taking false branch
if (off != sizeof(struct hfs_bnode_desc))
^
fs/hfs/bnode.c:383:14: note: Assuming 'i' is <= field 'num_recs'
for (i = 1; i <= node->num_recs; off = next_off, i++) {
^~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:383:2: note: Loop condition is true. Entering loop body
for (i = 1; i <= node->num_recs; off = next_off, i++) {
^
fs/hfs/bnode.c:386:7: note: Assuming 'next_off' is > 'off'
if (next_off <= off ||
^~~~~~~~~~~~~~~
fs/hfs/bnode.c:386:7: note: Left side of '||' is false
fs/hfs/bnode.c:387:7: note: Assuming 'next_off' is <= field 'node_size'
next_off > tree->node_size ||
^~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:386:7: note: Left side of '||' is false
if (next_off <= off ||
^
fs/hfs/bnode.c:388:7: note: Assuming the condition is false
next_off & 1)
^~~~~~~~~~~~
fs/hfs/bnode.c:386:3: note: Taking false branch
if (next_off <= off ||
^
fs/hfs/bnode.c:391:13: note: Field 'type' is equal to HFS_NODE_INDEX
if (node->type != HFS_NODE_INDEX &&
^
fs/hfs/bnode.c:391:36: note: Left side of '&&' is false
if (node->type != HFS_NODE_INDEX &&
^
fs/hfs/bnode.c:394:14: note: Calling 'hfs_bnode_read_u8'
key_size = hfs_bnode_read_u8(node, off) + 1;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:55:2: note: 'data' declared without an initial value
u8 data;
^~~~~~~
fs/hfs/bnode.c:57:2: note: Calling 'hfs_bnode_read'
hfs_bnode_read(node, &data, off, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:30:2: note: Loop condition is true. Entering loop body
for (bytes_read = 0; bytes_read < len; bytes_read += bytes_to_read) {
^
fs/hfs/bnode.c:31:7: note: Assuming 'pagenum' is >= field 'pages_per_bnode'
if (pagenum >= node->tree->pages_per_bnode)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:31:3: note: Taking true branch
if (pagenum >= node->tree->pages_per_bnode)
^
fs/hfs/bnode.c:32:4: note: Execution continues on line 31
break;
^
fs/hfs/bnode.c:43:1: note: Returning without writing to '*buf'
}
^
fs/hfs/bnode.c:57:2: note: Returning from 'hfs_bnode_read'
hfs_bnode_read(node, &data, off, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:58:2: note: Undefined or garbage value returned to caller
return data;
^ ~~~~
fs/hfs/bnode.c:83:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kmap(page) + off, buf, len);
^~~~~~
fs/hfs/bnode.c:83:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kmap(page) + off, buf, len);
^~~~~~
>> fs/hfs/bnode.c:108:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(page) + off, 0, len);
^~~~~~
fs/hfs/bnode.c:108:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(page) + off, 0, len);
^~~~~~
fs/hfs/bnode.c:126:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kmap(dst_page) + dst, kmap(src_page) + src, len);
^~~~~~
fs/hfs/bnode.c:126:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kmap(dst_page) + dst, kmap(src_page) + src, len);
^~~~~~
>> fs/hfs/bnode.c:144:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(ptr + dst, ptr + src, len);
^~~~~~~
fs/hfs/bnode.c:144:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(ptr + dst, ptr + src, len);
^~~~~~~
fs/hfs/bnode.c:179:4: warning: Value stored to 'tmp' is never read [clang-analyzer-deadcode.DeadStores]
tmp = hfs_bnode_read_u8(node, key_off);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:179:4: note: Value stored to 'tmp' is never read
tmp = hfs_bnode_read_u8(node, key_off);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hfs/bnode.c:443:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*pagep) + node->page_offset, 0,
^~~~~~
fs/hfs/bnode.c:443:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*pagep) + node->page_offset, 0,
^~~~~~
fs/hfs/bnode.c:448:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*++pagep), 0, PAGE_SIZE);
^~~~~~
fs/hfs/bnode.c:448:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*++pagep), 0, PAGE_SIZE);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
drivers/leds/led-class.c:35:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", led_cdev->brightness);
^~~~~~~
drivers/leds/led-class.c:35:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", led_cdev->brightness);
^~~~~~~
drivers/leds/led-class.c:73:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", led_cdev->max_brightness);
^~~~~~~
drivers/leds/led-class.c:73:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", led_cdev->max_brightness);
^~~~~~~
drivers/leds/led-class.c:318:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(name, len, "%s_%u", init_name, ++i);
^~~~~~~~
drivers/leds/led-class.c:318:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(name, len, "%s_%u", init_name, ++i);
^~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/leds/led-class-flash.c:75:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->brightness.val);
^~~~~~~
drivers/leds/led-class-flash.c:75:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->brightness.val);
^~~~~~~
drivers/leds/led-class-flash.c:85:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->brightness.max);
^~~~~~~
drivers/leds/led-class-flash.c:85:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->brightness.max);
^~~~~~~
drivers/leds/led-class-flash.c:133:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", state);
^~~~~~~
drivers/leds/led-class-flash.c:133:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", state);
^~~~~~~
drivers/leds/led-class-flash.c:172:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->timeout.val);
^~~~~~~
drivers/leds/led-class-flash.c:172:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->timeout.val);
^~~~~~~
drivers/leds/led-class-flash.c:182:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->timeout.max);
^~~~~~~
drivers/leds/led-class-flash.c:182:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->timeout.max);
^~~~~~~
drivers/leds/led-class-flash.c:203:14: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf_len = sprintf(pbuf, "%s ",
^~~~~~~
drivers/leds/led-class-flash.c:203:14: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf_len = sprintf(pbuf, "%s ",
^~~~~~~
drivers/leds/led-class-flash.c:210:16: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
return strlen(strcat(buf, "\n"));
^~~~~~
drivers/leds/led-class-flash.c:210:16: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
return strlen(strcat(buf, "\n"));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/fuse/xattr.c:25:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&inarg, 0, sizeof(inarg));
^~~~~~
fs/fuse/xattr.c:25:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&inarg, 0, sizeof(inarg));
^~~~~~
fs/fuse/xattr.c:63:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&inarg, 0, sizeof(inarg));
--
^~~~~~~~
drivers/scsi/libsas/sas_init.c:132:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "%s_disco_q", dev_name(sas_ha->dev));
^~~~~~~~
drivers/scsi/libsas/sas_init.c:132:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "%s_disco_q", dev_name(sas_ha->dev));
^~~~~~~~
drivers/scsi/libsas/sas_init.c:371:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(phy->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_init.c:371:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(phy->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/scsi/libsas/sas_port.c:126:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(port->sas_addr, phy->sas_addr,
^~~~~~
drivers/scsi/libsas/sas_port.c:126:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(port->sas_addr, phy->sas_addr,
^~~~~~
drivers/scsi/libsas/sas_port.c:150:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(port->attached_sas_addr, phy->attached_sas_addr,
^~~~~~
drivers/scsi/libsas/sas_port.c:150:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(port->attached_sas_addr, phy->attached_sas_addr,
^~~~~~
drivers/scsi/libsas/sas_port.c:239:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port->sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_port.c:239:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port->sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_port.c:240:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_port.c:240:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_port.c:319:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port, 0, sizeof(*port));
^~~~~~
drivers/scsi/libsas/sas_port.c:319:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port, 0, sizeof(*port));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/clk/clk-cdce925.c:118:3: warning: Value stored to 'rate' is never read [clang-analyzer-deadcode.DeadStores]
rate = parent_rate;
^ ~~~~~~~~~~~
drivers/clk/clk-cdce925.c:118:3: note: Value stored to 'rate' is never read
rate = parent_rate;
^ ~~~~~~~~~~~
drivers/clk/clk-cdce925.c:444:20: warning: Division by zero [clang-analyzer-core.DivideZero]
if (l_parent_rate / divider != rate) {
~~~~~~~~~~~~~~^~~~~~~~~
drivers/clk/clk-cdce925.c:442:16: note: Calling 'cdce925_calc_divider'
u16 divider = cdce925_calc_divider(rate, l_parent_rate);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/clk-cdce925.c:383:6: note: Assuming 'rate' is 0, which participates in a condition later
if (!rate)
^~~~~
drivers/clk/clk-cdce925.c:383:2: note: Taking true branch
if (!rate)
^
drivers/clk/clk-cdce925.c:384:3: note: Returning zero
return 0;
^~~~~~~~
drivers/clk/clk-cdce925.c:442:16: note: Returning from 'cdce925_calc_divider'
u16 divider = cdce925_calc_divider(rate, l_parent_rate);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/clk-cdce925.c:442:2: note: 'divider' initialized to 0
u16 divider = cdce925_calc_divider(rate, l_parent_rate);
^~~~~~~~~~~
drivers/clk/clk-cdce925.c:444:20: note: Division by zero
if (l_parent_rate / divider != rate) {
~~~~~~~~~~~~~~^~~~~~~~~
drivers/clk/clk-cdce925.c:717:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(child_name, "PLL%d", i+1);
^~~~~~~
drivers/clk/clk-cdce925.c:717:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(child_name, "PLL%d", i+1);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
>> drivers/power/supply/cros_peripheral_charger.c:75:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/power/supply/cros_peripheral_charger.c:75:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/power/supply/cros_peripheral_charger.c:79:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(indata, msg->data, insize);
^~~~~~
drivers/power/supply/cros_peripheral_charger.c:79:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(indata, msg->data, insize);
^~~~~~
>> drivers/power/supply/cros_peripheral_charger.c:342:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(port->name, sizeof(port->name), PCHG_DIR_NAME, i);
^~~~~~~~
drivers/power/supply/cros_peripheral_charger.c:342:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(port->name, sizeof(port->name), PCHG_DIR_NAME, i);
^~~~~~~~
Suppressed 17 warnings (10 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
net/netlink/policy.c:55:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state->policies[state->n_alloc], 0,
^~~~~~
net/netlink/policy.c:55:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state->policies[state->n_alloc], 0,
^~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
102 warnings generated.
net/ethtool/ioctl.c:201:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, netdev_features_strings,
^~~~~~
net/ethtool/ioctl.c:201:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, netdev_features_strings,
^~~~~~
net/ethtool/ioctl.c:204:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, rss_hash_func_strings,
^~~~~~
net/ethtool/ioctl.c:204:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, rss_hash_func_strings,
^~~~~~
net/ethtool/ioctl.c:207:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, tunable_strings, sizeof(tunable_strings));
^~~~~~
net/ethtool/ioctl.c:207:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, tunable_strings, sizeof(tunable_strings));
^~~~~~
net/ethtool/ioctl.c:209:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, phy_tunable_strings, sizeof(phy_tunable_strings));
^~~~~~
net/ethtool/ioctl.c:209:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, phy_tunable_strings, sizeof(phy_tunable_strings));
^~~~~~
net/ethtool/ioctl.c:215:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, link_mode_names,
^~~~~~
net/ethtool/ioctl.c:215:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, link_mode_names,
^~~~~~
net/ethtool/ioctl.c:401:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(legacy_settings, 0, sizeof(*legacy_settings));
^~~~~~
net/ethtool/ioctl.c:401:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(legacy_settings, 0, sizeof(*legacy_settings));
^~~~~~
net/ethtool/ioctl.c:460:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/ioctl.c:460:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/ioctl.c:476:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&to->base, &link_usettings.base, sizeof(to->base));
^~~~~~
net/ethtool/ioctl.c:476:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&to->base, &link_usettings.base, sizeof(to->base));
^~~~~~
net/ethtool/ioctl.c:518:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&link_usettings, from, sizeof(link_usettings));
^~~~~~
net/ethtool/ioctl.c:518:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&link_usettings, from, sizeof(link_usettings));
^~~~~~
net/ethtool/ioctl.c:554:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link_ksettings, 0, sizeof(link_ksettings));
^~~~~~
net/ethtool/ioctl.c:554:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link_ksettings, 0, sizeof(link_ksettings));
^~~~~~
net/ethtool/ioctl.c:576:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link_ksettings, 0, sizeof(link_ksettings));
^~~~~~
net/ethtool/ioctl.c:576:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link_ksettings, 0, sizeof(link_ksettings));
^~~~~~
net/ethtool/ioctl.c:676:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link_ksettings, 0, sizeof(link_ksettings));
--
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:265:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+5,4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:265:2: note: Value stored to 'ret' is never read
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+5,4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:383:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+1,4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:383:2: note: Value stored to 'ret' is never read
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+1,4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:391:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+5,6);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:391:2: note: Value stored to 'ret' is never read
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+5,6);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:395:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+12,2);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:395:2: note: Value stored to 'ret' is never read
ret=tuner_i2c_xfer_send(&priv->i2c_props,buf+12,2);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/mt20xx.c:423:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &mt2032_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/mt20xx.c:423:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &mt2032_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/mt20xx.c:585:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &mt2050_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/mt20xx.c:585:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &mt2050_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/mt20xx.c:610:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf,0,sizeof(buf));
^~~~~~
drivers/media/tuners/mt20xx.c:610:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf,0,sizeof(buf));
^~~~~~
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/leds/leds-88pm860x.c:167:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data->name, 0, MFD_NAME_SIZE);
^~~~~~
drivers/leds/leds-88pm860x.c:167:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data->name, 0, MFD_NAME_SIZE);
^~~~~~
drivers/leds/leds-88pm860x.c:171:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led0-red");
^~~~~~~
drivers/leds/leds-88pm860x.c:171:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led0-red");
^~~~~~~
drivers/leds/leds-88pm860x.c:175:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led0-green");
^~~~~~~
drivers/leds/leds-88pm860x.c:175:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led0-green");
^~~~~~~
drivers/leds/leds-88pm860x.c:179:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led0-blue");
^~~~~~~
drivers/leds/leds-88pm860x.c:179:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led0-blue");
^~~~~~~
drivers/leds/leds-88pm860x.c:183:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led1-red");
^~~~~~~
drivers/leds/leds-88pm860x.c:183:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led1-red");
^~~~~~~
drivers/leds/leds-88pm860x.c:187:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led1-green");
^~~~~~~
drivers/leds/leds-88pm860x.c:187:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led1-green");
^~~~~~~
drivers/leds/leds-88pm860x.c:191:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data->name, "led1-blue");
^~~~~~~
drivers/leds/leds-88pm860x.c:191:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data->name, "led1-blue");
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/input/mouse/synaptics.c:424:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
drivers/input/mouse/synaptics.c:424:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, sizeof(*info));
^~~~~~
drivers/input/mouse/synaptics.c:778:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hw, 0, sizeof(struct synaptics_hw_state));
^~~~~~
drivers/input/mouse/synaptics.c:778:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hw, 0, sizeof(struct synaptics_hw_state));
^~~~~~
>> drivers/input/mouse/synaptics.c:1366:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%c\n", priv->disable_gesture ? '1' : '0');
^~~~~~~
drivers/input/mouse/synaptics.c:1366:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%c\n", priv->disable_gesture ? '1' : '0');
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
>> drivers/input/mouse/alps.c:733:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(f, 0, sizeof(*f));
^~~~~~
drivers/input/mouse/alps.c:733:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(f, 0, sizeof(*f));
^~~~~~
>> drivers/input/mouse/alps.c:777:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->multi_data, packet, sizeof(priv->multi_data));
^~~~~~
drivers/input/mouse/alps.c:777:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->multi_data, packet, sizeof(priv->multi_data));
^~~~~~
drivers/input/mouse/alps.c:852:12: warning: Although the value stored to 'z' is used in the enclosing expression, the value is never actually read from 'z' [clang-analyzer-deadcode.DeadStores]
x = y = z = 0;
^ ~
drivers/input/mouse/alps.c:852:12: note: Although the value stored to 'z' is used in the enclosing expression, the value is never actually read from 'z'
x = y = z = 0;
^ ~
drivers/input/mouse/alps.c:1122:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(f, 0, sizeof(*f));
^~~~~~
drivers/input/mouse/alps.c:1122:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(f, 0, sizeof(*f));
^~~~~~
drivers/input/mouse/alps.c:1294:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(f, 0, sizeof(struct alps_fields));
^~~~~~
drivers/input/mouse/alps.c:1294:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(f, 0, sizeof(struct alps_fields));
^~~~~~
drivers/input/mouse/alps.c:1322:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(f, 0, sizeof(struct alps_fields));
^~~~~~
drivers/input/mouse/alps.c:1322:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(f, 0, sizeof(struct alps_fields));
^~~~~~
drivers/input/mouse/alps.c:1349:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->multi_data, packet, sizeof(priv->multi_data));
^~~~~~
drivers/input/mouse/alps.c:1349:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->multi_data, packet, sizeof(priv->multi_data));
^~~~~~
>> drivers/input/mouse/alps.c:1419:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(priv->phys3, sizeof(priv->phys3), "%s/%s",
^~~~~~~~
drivers/input/mouse/alps.c:1419:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(priv->phys3, sizeof(priv->phys3), "%s/%s",
^~~~~~~~
drivers/input/mouse/alps.c:2013:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psmouse->packet, buf, sizeof(buf));
^~~~~~
drivers/input/mouse/alps.c:2013:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(psmouse->packet, buf, sizeof(buf));
^~~~~~
drivers/input/mouse/alps.c:2586:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(otp, 0, sizeof(otp));
^~~~~~
drivers/input/mouse/alps.c:2586:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(otp, 0, sizeof(otp));
^~~~~~
drivers/input/mouse/alps.c:2932:4: warning: Value stored to 'protocol' is never read [clang-analyzer-deadcode.DeadStores]
protocol = &alps_v9_protocol_data;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/input/mouse/alps.c:2932:4: note: Value stored to 'protocol' is never read
protocol = &alps_v9_protocol_data;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/input/mouse/alps.c:2946:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->dev_id, e7, 3);
^~~~~~
drivers/input/mouse/alps.c:2946:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->dev_id, e7, 3);
^~~~~~
drivers/input/mouse/alps.c:2947:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->fw_ver, ec, 3);
^~~~~~
drivers/input/mouse/alps.c:2947:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->fw_ver, ec, 3);
^~~~~~
drivers/input/mouse/alps.c:3102:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(priv->phys2, sizeof(priv->phys2), "%s/input1",
^~~~~~~~
drivers/input/mouse/alps.c:3102:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(priv->phys2, sizeof(priv->phys2), "%s/input1",
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/hid/hid-lenovo.c:403:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
^~~~~~~~
drivers/hid/hid-lenovo.c:403:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
^~~~~~~~
drivers/hid/hid-lenovo.c:445:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:445:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:606:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:606:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:636:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
^~~~~~~~
drivers/hid/hid-lenovo.c:636:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
^~~~~~~~
drivers/hid/hid-lenovo.c:666:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:666:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:696:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
^~~~~~~~
drivers/hid/hid-lenovo.c:696:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
^~~~~~~~
drivers/hid/hid-lenovo.c:726:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:726:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:755:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:755:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:876:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
^~~~~~~~
drivers/hid/hid-lenovo.c:876:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
^~~~~~~~
drivers/hid/hid-lenovo.c:877:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name_micm, name_sz, "%s:amber:micmute", dev_name(&hdev->dev));
--
^~~~~~~
drivers/hwmon/w83792d.c:841:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", (long)data->sf2_points[index-1][nr-1]);
^~~~~~~
drivers/hwmon/w83792d.c:841:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", (long)data->sf2_points[index-1][nr-1]);
^~~~~~~
drivers/hwmon/w83792d.c:882:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/w83792d.c:882:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/md/persistent-data/dm-space-map-disk.c:166:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smd->old_ll, &smd->ll, sizeof(smd->old_ll));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:166:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smd->old_ll, &smd->ll, sizeof(smd->old_ll));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:192:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(where_le, &root_le, sizeof(root_le));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:192:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(where_le, &root_le, sizeof(root_le));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:228:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smd->sm, &ops, sizeof(smd->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:228:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smd->sm, &ops, sizeof(smd->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:262:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smd->sm, &ops, sizeof(smd->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-disk.c:262:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smd->sm, &ops, sizeof(smd->sm));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/md/persistent-data/dm-space-map-metadata.c:150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(result, bop, sizeof(*result));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(result, bop, sizeof(*result));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:514:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smm->old_ll, &smm->ll, sizeof(smm->old_ll));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:514:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smm->old_ll, &smm->ll, sizeof(smm->old_ll));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:552:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(where_le, &root_le, sizeof(root_le));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:552:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(where_le, &root_le, sizeof(root_le));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:725:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm, &bootstrap_ops, sizeof(*sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:725:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm, &bootstrap_ops, sizeof(*sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:761:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sm, &ops, sizeof(*sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:761:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sm, &ops, sizeof(*sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:775:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smm->sm, &ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:775:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smm->sm, &ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:794:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smm->sm, &bootstrap_ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:794:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smm->sm, &bootstrap_ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:802:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smm->sm, &ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:802:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smm->sm, &ops, sizeof(smm->sm));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:840:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&smm->old_ll, &smm->ll, sizeof(smm->old_ll));
^~~~~~
drivers/md/persistent-data/dm-space-map-metadata.c:840:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&smm->old_ll, &smm->ll, sizeof(smm->old_ll));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
>> drivers/platform/chrome/cros_ec_vbc.c:50:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, msg->data, resp_sz);
^~~~~~
drivers/platform/chrome/cros_ec_vbc.c:50:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, msg->data, resp_sz);
^~~~~~
drivers/platform/chrome/cros_ec_vbc.c:79:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(params->block, buf, data_sz);
^~~~~~
drivers/platform/chrome/cros_ec_vbc.c:79:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(params->block, buf, data_sz);
^~~~~~
Suppressed 23 warnings (16 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/platform/chrome/cros_ec_debugfs.c:91:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(read_params, '\0', sizeof(*read_params));
^~~~~~
drivers/platform/chrome/cros_ec_debugfs.c:91:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(read_params, '\0', sizeof(*read_params));
^~~~~~
Suppressed 34 warnings (27 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/hwtracing/intel_th/core.c:390:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(thdev->name, name);
^~~~~~
drivers/hwtracing/intel_th/core.c:390:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(thdev->name, name);
^~~~~~
drivers/hwtracing/intel_th/core.c:631:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(res, subdev->res,
^~~~~~
drivers/hwtracing/intel_th/core.c:631:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(res, subdev->res,
^~~~~~
drivers/hwtracing/intel_th/core.c:1023:35: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
struct intel_th_driver *hubdrv = to_intel_th_driver(hub->dev.driver);
^
drivers/hwtracing/intel_th/intel_th.h:192:2: note: expanded from macro 'to_intel_th_driver'
container_of((_d), struct intel_th_driver, driver)
^
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^
drivers/hwtracing/intel_th/core.c:313:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/hwtracing/intel_th/core.c:313:2: note: Taking false branch
if (ret)
^
drivers/hwtracing/intel_th/core.c:316:7: note: Assuming 'val' is 0
if (!!val != thdev->output.active) {
^~~~
drivers/hwtracing/intel_th/core.c:316:6: note: Assuming the condition is true
if (!!val != thdev->output.active) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/intel_th/core.c:316:2: note: Taking true branch
if (!!val != thdev->output.active) {
^
drivers/hwtracing/intel_th/core.c:317:7: note: 'val' is 0
if (val)
^~~
drivers/hwtracing/intel_th/core.c:317:3: note: Taking false branch
if (val)
^
drivers/hwtracing/intel_th/core.c:320:4: note: Calling 'intel_th_output_deactivate'
intel_th_output_deactivate(thdev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/intel_th/core.c:279:3: note: Assuming field 'driver' is non-null
to_intel_th_driver_or_null(thdev->dev.driver);
^
drivers/hwtracing/intel_th/intel_th.h:195:3: note: expanded from macro 'to_intel_th_driver_or_null'
((_d) ? to_intel_th_driver(_d) : NULL)
^~~~
drivers/hwtracing/intel_th/core.c:279:3: note: '?' condition is true
to_intel_th_driver_or_null(thdev->dev.driver);
^
drivers/hwtracing/intel_th/intel_th.h:195:3: note: expanded from macro 'to_intel_th_driver_or_null'
((_d) ? to_intel_th_driver(_d) : NULL)
^
drivers/hwtracing/intel_th/core.c:282:7: note: 'thdrv' is non-null
if (!thdrv)
^~~~~
drivers/hwtracing/intel_th/core.c:282:2: note: Taking false branch
if (!thdrv)
^
drivers/hwtracing/intel_th/core.c:285:6: note: Assuming field 'deactivate' is null
if (thdrv->deactivate)
^~~~~~~~~~~~~~~~~
drivers/hwtracing/intel_th/core.c:285:2: note: Taking false branch
if (thdrv->deactivate)
^
drivers/hwtracing/intel_th/core.c:288:3: note: Calling 'intel_th_trace_disable'
intel_th_trace_disable(thdev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/intel_th/core.c:1022:2: note: 'hub' initialized to a null pointer value
struct intel_th_device *hub = to_intel_th_device(thdev->dev.parent);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/intel_th/core.c:1023:35: note: Dereference of null pointer
struct intel_th_driver *hubdrv = to_intel_th_driver(hub->dev.driver);
^
drivers/hwtracing/intel_th/intel_th.h:192:2: note: expanded from macro 'to_intel_th_driver'
container_of((_d), struct intel_th_driver, driver)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/hwtracing/intel_th/core.c:1040:26: warning: Value stored to 'hubdrv' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct intel_th_driver *hubdrv = to_intel_th_driver(hub->dev.driver);
^~~~~~
drivers/hwtracing/intel_th/core.c:1040:26: note: Value stored to 'hubdrv' during its initialization is never read
struct intel_th_driver *hubdrv = to_intel_th_driver(hub->dev.driver);
--
^
include/linux/hid.h:1024:3: note: Execution continues on line 1035
break;
^
include/linux/hid.h:1035:15: note: 'c' is <= 'limit'
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:15: note: Left side of '||' is false
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1035:28: note: Assuming 'bmap' is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:28: note: Assuming pointer value is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1035:2: note: Taking true branch
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1036:3: note: Assuming the condition is true
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/printk.h:639:6: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^~~~~~~~~~~~~~~~~
include/linux/ratelimit_types.h:41:28: note: expanded from macro '__ratelimit'
#define __ratelimit(state) ___ratelimit(state, __func__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1036:3: note: Taking true branch
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:639:2: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^
include/linux/hid.h:1036:3: note: Loop condition is false. Exiting loop
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
^
include/linux/printk.h:656:2: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:640:3: note: expanded from macro 'printk_ratelimited'
printk(fmt, ##__VA_ARGS__); \
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
include/linux/hid.h:1037:9: note: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input')
input->name, c, type);
^
include/linux/printk.h:656:49: note: expanded from macro 'pr_warn_ratelimited'
printk_ratelimited(KERN_WARNING pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~
include/linux/printk.h:640:17: note: expanded from macro 'printk_ratelimited'
printk(fmt, ##__VA_ARGS__); \
^~~~~~~~~~~
include/linux/printk.h:446:60: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^~~~~~~~~~~
include/linux/printk.h:418:19: note: expanded from macro 'printk_index_wrap'
_p_func(_fmt, ##__VA_ARGS__); \
^~~~~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/fpga/dfl.c:309:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", ddev->type);
^~~~~~~
drivers/fpga/dfl.c:309:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", ddev->type);
^~~~~~~
drivers/fpga/dfl.c:318:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", ddev->feature_id);
^~~~~~~
drivers/fpga/dfl.c:318:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", ddev->feature_id);
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/fpga/dfl-afu-main.c:175:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_CTRL_LATENCY, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:175:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_CTRL_LATENCY, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:216:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_STS_AP1_EVT, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:216:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_STS_AP1_EVT, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:254:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_STS_AP2_EVT, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:254:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", (u8)FIELD_GET(PORT_STS_AP2_EVT, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:291:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", (u8)FIELD_GET(PORT_STS_PWR_STATE, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:291:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", (u8)FIELD_GET(PORT_STS_PWR_STATE, v));
^~~~~~~
drivers/fpga/dfl-afu-main.c:351:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%llx\n", (unsigned long long)userclk_freqsts);
^~~~~~~
drivers/fpga/dfl-afu-main.c:351:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%llx\n", (unsigned long long)userclk_freqsts);
^~~~~~~
drivers/fpga/dfl-afu-main.c:369:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%llx\n",
^~~~~~~
drivers/fpga/dfl-afu-main.c:369:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%llx\n",
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/mtd/devices/slram.c:87:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(priv->start + instr->addr, 0xff, instr->len);
^~~~~~
drivers/mtd/devices/slram.c:87:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(priv->start + instr->addr, 0xff, instr->len);
^~~~~~
drivers/mtd/devices/slram.c:112:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, priv->start + from, len);
^~~~~~
drivers/mtd/devices/slram.c:112:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, priv->start + from, len);
^~~~~~
drivers/mtd/devices/slram.c:122:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->start + to, buf, len);
^~~~~~
drivers/mtd/devices/slram.c:122:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->start + to, buf, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/mtd/devices/mtdram.c:60:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)mtd->priv + instr->addr, 0xff, instr->len);
^~~~~~
drivers/mtd/devices/mtdram.c:60:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)mtd->priv + instr->addr, 0xff, instr->len);
^~~~~~
drivers/mtd/devices/mtdram.c:102:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, mtd->priv + from, len);
^~~~~~
drivers/mtd/devices/mtdram.c:102:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, mtd->priv + from, len);
^~~~~~
drivers/mtd/devices/mtdram.c:110:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mtd->priv + to, buf, len);
^~~~~~
drivers/mtd/devices/mtdram.c:110:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)mtd->priv + to, buf, len);
^~~~~~
drivers/mtd/devices/mtdram.c:127:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mtd, 0, sizeof(*mtd));
^~~~~~
drivers/mtd/devices/mtdram.c:127:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mtd, 0, sizeof(*mtd));
^~~~~~
drivers/mtd/devices/mtdram.c:178:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mtd_info->priv, 0xff, MTDRAM_TOTAL_SIZE);
^~~~~~
drivers/mtd/devices/mtdram.c:178:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mtd_info->priv, 0xff, MTDRAM_TOTAL_SIZE);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
>> drivers/nfc/nfcsim.c:363:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = snprintf(devname, sizeof(devname), "nfc%d", idx);
^~~~~~~~
drivers/nfc/nfcsim.c:363:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
n = snprintf(devname, sizeof(devname), "nfc%d", idx);
^~~~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/power/supply/ds2760_battery.c:692:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "ds2760-battery.%d", dev->id);
^~~~~~~~
drivers/power/supply/ds2760_battery.c:692:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "ds2760-battery.%d", dev->id);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/nilfs2/recovery.c:485:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr + bh_offset(bh_org), bh_org->b_data, bh_org->b_size);
^~~~~~
fs/nilfs2/recovery.c:485:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr + bh_offset(bh_org), bh_org->b_data, bh_org->b_size);
^~~~~~
fs/nilfs2/recovery.c:701:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, bh->b_size);
^~~~~~
fs/nilfs2/recovery.c:701:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, bh->b_size);
^~~~~~
include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
__list_del(entry->prev, entry->next);
^
fs/nilfs2/recovery.c:824:9: note: Assuming 'b' is > 'seg_end'
while (b <= seg_end)
^~~~~~~~~~~~
fs/nilfs2/recovery.c:824:2: note: Loop condition is false. Execution continues on line 827
while (b <= seg_end)
^
fs/nilfs2/recovery.c:827:2: note: Loop condition is true. Entering loop body
for (;;) {
^
fs/nilfs2/recovery.c:831:8: note: 'bh_sum' is non-null
if (!bh_sum)
^~~~~~
fs/nilfs2/recovery.c:831:3: note: Taking false branch
if (!bh_sum)
^
fs/nilfs2/recovery.c:835:7: note: 'ret' is 0
if (ret) {
^~~
fs/nilfs2/recovery.c:835:3: note: Taking false branch
if (ret) {
^
fs/nilfs2/recovery.c:843:16: note: Assuming 'pseg_end' is <= 'seg_end'
if (unlikely(pseg_end > seg_end)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/nilfs2/recovery.c:843:3: note: Taking false branch
if (unlikely(pseg_end > seg_end)) {
^
fs/nilfs2/recovery.c:858:7: note: Assuming the condition is false
if (!(flags & NILFS_SS_SR) && !scan_newer) {
^~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:858:30: note: Left side of '&&' is false
if (!(flags & NILFS_SS_SR) && !scan_newer) {
^
fs/nilfs2/recovery.c:868:7: note: Assuming 'pseg_start' is not equal to 'seg_start'
if (pseg_start == seg_start) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:868:3: note: Taking false branch
if (pseg_start == seg_start) {
^
fs/nilfs2/recovery.c:874:3: note: Taking false branch
if (!(flags & NILFS_SS_SR)) {
--
^
fs/nilfs2/recovery.c:827:2: note: Loop condition is true. Entering loop body
for (;;) {
^
fs/nilfs2/recovery.c:831:8: note: 'bh_sum' is non-null
if (!bh_sum)
^~~~~~
fs/nilfs2/recovery.c:831:3: note: Taking false branch
if (!bh_sum)
^
fs/nilfs2/recovery.c:835:7: note: 'ret' is 0
if (ret) {
^~~
fs/nilfs2/recovery.c:835:3: note: Taking false branch
if (ret) {
^
fs/nilfs2/recovery.c:843:16: note: Assuming 'pseg_end' is <= 'seg_end'
if (unlikely(pseg_end > seg_end)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/nilfs2/recovery.c:843:3: note: Taking false branch
if (unlikely(pseg_end > seg_end)) {
^
fs/nilfs2/recovery.c:858:7: note: Assuming the condition is false
if (!(flags & NILFS_SS_SR) && !scan_newer) {
^~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:858:30: note: Left side of '&&' is false
if (!(flags & NILFS_SS_SR) && !scan_newer) {
^
fs/nilfs2/recovery.c:868:7: note: Assuming 'pseg_start' is not equal to 'seg_start'
if (pseg_start == seg_start) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:868:3: note: Taking false branch
if (pseg_start == seg_start) {
^
fs/nilfs2/recovery.c:874:3: note: Taking false branch
if (!(flags & NILFS_SS_SR)) {
^
fs/nilfs2/recovery.c:898:7: note: 'scan_newer' is 0
if (scan_newer)
^~~~~~~~~~
fs/nilfs2/recovery.c:898:3: note: Taking false branch
if (scan_newer)
^
fs/nilfs2/recovery.c:901:8: note: Assuming the condition is false
if (nilfs->ns_mount_state & NILFS_VALID_FS)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:901:4: note: Taking false branch
if (nilfs->ns_mount_state & NILFS_VALID_FS)
^
fs/nilfs2/recovery.c:909:7: note: Assuming 'pseg_start' is >= 'seg_end'
if (pseg_start < seg_end)
^~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:909:3: note: Taking false branch
if (pseg_start < seg_end)
^
fs/nilfs2/recovery.c:911:3: note: Control jumps to line 924
goto feed_segment;
^
fs/nilfs2/recovery.c:924:3: note: Taking false branch
if (empty_seg++)
^
fs/nilfs2/recovery.c:928:3: note: Taking false branch
if (unlikely(ret))
^
fs/nilfs2/recovery.c:827:2: note: Loop condition is true. Entering loop body
for (;;) {
^
fs/nilfs2/recovery.c:831:8: note: 'bh_sum' is null
if (!bh_sum)
^~~~~~
fs/nilfs2/recovery.c:831:3: note: Taking true branch
if (!bh_sum)
^
fs/nilfs2/recovery.c:832:4: note: Control jumps to line 947
goto failed;
^
fs/nilfs2/recovery.c:948:2: note: Calling 'nilfs_dispose_segment_list'
nilfs_dispose_segment_list(&segments);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/recovery.c:406:2: note: Loop condition is true. Entering loop body
while (!list_empty(head)) {
^
fs/nilfs2/recovery.c:411:3: note: Memory is released
kfree(ent);
^~~~~~~~~~
fs/nilfs2/recovery.c:406:2: note: Loop condition is true. Entering loop body
while (!list_empty(head)) {
^
fs/nilfs2/recovery.c:410:3: note: Calling 'list_del'
list_del(&ent->list);
^~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
>> drivers/clk/clk-lochnagar.c:261:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->lclks, conf->clks, sizeof(priv->lclks));
^~~~~~
drivers/clk/clk-lochnagar.c:261:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->lclks, conf->clks, sizeof(priv->lclks));
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/adt7411.c:172:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret < 0 ? ret : sprintf(buf, "%u\n", !!(ret & attr2->nr));
^~~~~~~
drivers/hwmon/adt7411.c:172:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret < 0 ? ret : sprintf(buf, "%u\n", !!(ret & attr2->nr));
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/hwmon/adt7470.c:481:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->auto_update_interval);
^~~~~~~
drivers/hwmon/adt7470.c:481:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->auto_update_interval);
^~~~~~~
drivers/hwmon/adt7470.c:512:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->num_temp_sensors);
^~~~~~~
drivers/hwmon/adt7470.c:512:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->num_temp_sensors);
^~~~~~~
drivers/hwmon/adt7470.c:599:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", data->alarms_mask);
^~~~~~~
drivers/hwmon/adt7470.c:599:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", data->alarms_mask);
^~~~~~~
drivers/hwmon/adt7470.c:699:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->force_pwm_max);
^~~~~~~
drivers/hwmon/adt7470.c:699:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->force_pwm_max);
^~~~~~~
drivers/hwmon/adt7470.c:865:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->pwm_max[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:865:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->pwm_max[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:900:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->pwm_min[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:900:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->pwm_min[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:936:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1000 * (20 + data->pwm_tmin[attr->index]));
^~~~~~~
drivers/hwmon/adt7470.c:936:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1000 * (20 + data->pwm_tmin[attr->index]));
^~~~~~~
drivers/hwmon/adt7470.c:948:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1000 * data->pwm_tmin[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:948:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1000 * data->pwm_tmin[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:987:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1 << (ctrl - 1));
^~~~~~~
drivers/hwmon/adt7470.c:987:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1 << (ctrl - 1));
^~~~~~~
drivers/hwmon/adt7470.c:989:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7470_PWM_ALL_TEMPS);
^~~~~~~
drivers/hwmon/adt7470.c:989:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7470_PWM_ALL_TEMPS);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
net/atm/resources.c:109:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dev->flags, 0, sizeof(dev->flags));
^~~~~~
net/atm/resources.c:109:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dev->flags, 0, sizeof(dev->flags));
^~~~~~
net/atm/resources.c:110:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dev->stats, 0, sizeof(dev->stats));
^~~~~~
net/atm/resources.c:110:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dev->stats, 0, sizeof(dev->stats));
^~~~~~
net/atm/resources.c:279:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->esi, esi, ESI_LEN);
^~~~~~
net/atm/resources.c:279:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->esi, esi, ESI_LEN);
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> drivers/input/mouse/byd.c:388:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(param, 0, sizeof(param));
^~~~~~
drivers/input/mouse/byd.c:388:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(param, 0, sizeof(param));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> drivers/input/mouse/logips2pp.c:155:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", psmouse->smartscroll);
^~~~~~~
drivers/input/mouse/logips2pp.c:155:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", psmouse->smartscroll);
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
>> drivers/input/mouse/sentelic.c:454:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x%02x\n", pad->last_reg, pad->last_val);
^~~~~~~
drivers/input/mouse/sentelic.c:454:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x%02x\n", pad->last_reg, pad->last_val);
^~~~~~~
drivers/input/mouse/sentelic.c:496:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", val);
^~~~~~~
drivers/input/mouse/sentelic.c:496:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", val);
^~~~~~~
drivers/input/mouse/sentelic.c:526:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pad->vscroll);
^~~~~~~
drivers/input/mouse/sentelic.c:526:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pad->vscroll);
^~~~~~~
drivers/input/mouse/sentelic.c:555:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pad->hscroll);
^~~~~~~
drivers/input/mouse/sentelic.c:555:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pad->hscroll);
^~~~~~~
drivers/input/mouse/sentelic.c:584:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%c\n",
^~~~~~~
drivers/input/mouse/sentelic.c:584:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%c\n",
^~~~~~~
>> drivers/input/mouse/sentelic.c:615:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "Sentelic FSP kernel module %s\n", fsp_drv_ver);
^~~~~~~
drivers/input/mouse/sentelic.c:615:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "Sentelic FSP kernel module %s\n", fsp_drv_ver);
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/virtio/virtio_ring.c:577:2: warning: Array subscript is undefined [clang-analyzer-core.uninitialized.ArraySubscript]
desc[prev].flags &= cpu_to_virtio16(_vq->vdev, ~VRING_DESC_F_NEXT);
^ ~~~~
drivers/virtio/virtio_ring.c:490:40: note: 'prev' declared without an initial value
unsigned int i, n, avail, descs_used, prev, err_idx;
^~~~
drivers/virtio/virtio_ring.c:496:9: note: Assuming 'data' is not equal to null
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:65:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:496:2: note: Taking false branch
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:496:2: note: Loop condition is false. Exiting loop
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:9: note: Assuming 'ctx' is null
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:65:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:497:13: note: Left side of '&&' is false
BUG_ON(ctx && vq->indirect);
^
drivers/virtio/virtio_ring.c:497:2: note: Taking false branch
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:2: note: Loop condition is false. Exiting loop
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:499:6: note: Assuming field 'broken' is false
if (unlikely(vq->broken)) {
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/virtio/virtio_ring.c:499:2: note: Taking false branch
if (unlikely(vq->broken)) {
^
drivers/virtio/virtio_ring.c:506:9: note: Assuming 'total_sg' is not equal to 0
BUG_ON(total_sg == 0);
^
include/asm-generic/bug.h:65:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:506:2: note: Taking false branch
BUG_ON(total_sg == 0);
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:506:2: note: Loop condition is false. Exiting loop
BUG_ON(total_sg == 0);
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:510:6: note: Assuming the condition is true
if (virtqueue_use_indirect(_vq, total_sg))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/virtio/virtio_ring.c:510:2: note: Taking true branch
if (virtqueue_use_indirect(_vq, total_sg))
^
drivers/virtio/virtio_ring.c:517:6: note: Assuming 'desc' is non-null
if (desc) {
^~~~
drivers/virtio/virtio_ring.c:517:2: note: Taking true branch
if (desc) {
--
^~~~~~
lib/bch.c:1123:27: warning: The result of the left shift is undefined because the right operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
const unsigned int k = 1 << deg(poly);
^ ~~~~~~~~~
lib/bch.c:1123:30: note: Calling 'deg'
const unsigned int k = 1 << deg(poly);
^~~~~~~~~
lib/bch.c:345:2: note: Returning the value -1
return fls(poly)-1;
^~~~~~~~~~~~~~~~~~
lib/bch.c:1123:30: note: Returning from 'deg'
const unsigned int k = 1 << deg(poly);
^~~~~~~~~
lib/bch.c:1123:27: note: The result of the left shift is undefined because the right operand is negative
const unsigned int k = 1 << deg(poly);
^ ~~~~~~~~~
lib/bch.c:1156:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bch->mod8_tab, 0, 4*256*l*sizeof(*bch->mod8_tab));
^~~~~~
lib/bch.c:1156:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bch->mod8_tab, 0, 4*256*l*sizeof(*bch->mod8_tab));
^~~~~~
lib/bch.c:1200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(xi, 0, sizeof(xi));
^~~~~~
lib/bch.c:1200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(xi, 0, sizeof(xi));
^~~~~~
lib/bch.c:1253:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(roots , 0, (bch->n+1)*sizeof(*roots));
^~~~~~
lib/bch.c:1253:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(roots , 0, (bch->n+1)*sizeof(*roots));
^~~~~~
Suppressed 8 warnings (8 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/md/dm-verity-target.c:247:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(verity_env, DM_VERITY_ENV_LENGTH, "%s=%d,%llu",
^~~~~~~~
drivers/md/dm-verity-target.c:247:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(verity_env, DM_VERITY_ENV_LENGTH, "%s=%d,%llu",
^~~~~~~~
drivers/md/dm-verity-target.c:323:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(want_digest, data, v->digest_size);
^~~~~~
drivers/md/dm-verity-target.c:323:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(want_digest, data, v->digest_size);
^~~~~~
drivers/md/dm-verity-target.c:353:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(digest, v->root_digest, v->digest_size);
^~~~~~
drivers/md/dm-verity-target.c:353:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(digest, v->root_digest, v->digest_size);
^~~~~~
drivers/md/dm-verity-target.c:453:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, len);
^~~~~~
drivers/md/dm-verity-target.c:453:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, len);
^~~~~~
drivers/md/dm-verity-target.c:1088:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[0], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1088:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[0], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1108:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[3], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1108:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[3], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1118:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[4], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1118:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[4], "%u%c", &num, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1128:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[5], "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1128:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[5], "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1143:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[6], "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
drivers/md/dm-verity-target.c:1143:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[6], "%llu%c", &num_ll, &dummy) != 1 ||
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> fs/hfs/catalog.c:31:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&key->cat.CName, 0, sizeof(struct hfs_name));
^~~~~~
fs/hfs/catalog.c:31:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&key->cat.CName, 0, sizeof(struct hfs_name));
^~~~~~
fs/hfs/catalog.c:40:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rec, 0, sizeof(*rec));
^~~~~~
fs/hfs/catalog.c:40:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rec, 0, sizeof(*rec));
^~~~~~
fs/hfs/catalog.c:70:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rec->thread.reserved, 0, sizeof(rec->thread.reserved));
^~~~~~
fs/hfs/catalog.c:70:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rec->thread.reserved, 0, sizeof(rec->thread.reserved));
^~~~~~
>> fs/hfs/catalog.c:210:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fd->search_key->cat.CName.name, rec.thread.CName.name, len);
^~~~~~
fs/hfs/catalog.c:210:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fd->search_key->cat.CName.name, rec.thread.CName.name, len);
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/leds/leds-pwm.c:141:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&led, 0, sizeof(led));
^~~~~~
drivers/leds/leds-pwm.c:141:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&led, 0, sizeof(led));
^~~~~~
drivers/leds/leds-pwm.c:146:15: warning: Access to field 'name' results in a dereference of a null pointer [clang-analyzer-core.NullDereference]
led.name = to_of_node(fwnode)->name;
^
include/linux/of.h:161:2: note: expanded from macro 'to_of_node'
({ \
^
drivers/leds/leds-pwm.c:180:6: note: Assuming 'count' is not equal to 0
if (!count)
^~~~~~
drivers/leds/leds-pwm.c:180:2: note: Taking false branch
if (!count)
^
drivers/leds/leds-pwm.c:185:6: note: Assuming 'priv' is non-null
if (!priv)
^~~~~
drivers/leds/leds-pwm.c:185:2: note: Taking false branch
if (!priv)
^
drivers/leds/leds-pwm.c:188:8: note: Calling 'led_pwm_create_fwnode'
ret = led_pwm_create_fwnode(&pdev->dev, priv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/leds-pwm.c:143:2: note: Loop condition is true. Entering loop body
device_for_each_child_node(dev, fwnode) {
^
include/linux/property.h:112:2: note: expanded from macro 'device_for_each_child_node'
for (child = device_get_next_child_node(dev, NULL); child; \
^
drivers/leds/leds-pwm.c:145:7: note: Assuming 'ret' is not equal to 0
if (ret && is_of_node(fwnode))
^~~
drivers/leds/leds-pwm.c:145:7: note: Left side of '&&' is true
drivers/leds/leds-pwm.c:145:14: note: Assuming the condition is true
if (ret && is_of_node(fwnode))
^~~~~~~~~~~~~~~~~~
drivers/leds/leds-pwm.c:145:3: note: Taking true branch
if (ret && is_of_node(fwnode))
^
drivers/leds/leds-pwm.c:146:15: note: Assuming the condition is false
led.name = to_of_node(fwnode)->name;
^
include/linux/of.h:164:3: note: expanded from macro 'to_of_node'
is_of_node(__to_of_node_fwnode) ? \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/leds-pwm.c:146:15: note: '?' condition is false
led.name = to_of_node(fwnode)->name;
^
include/linux/of.h:164:3: note: expanded from macro 'to_of_node'
is_of_node(__to_of_node_fwnode) ? \
^
drivers/leds/leds-pwm.c:146:15: note: Access to field 'name' results in a dereference of a null pointer
led.name = to_of_node(fwnode)->name;
^
include/linux/of.h:161:2: note: expanded from macro 'to_of_node'
({ \
^
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/ext4/hash.c:221:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
fs/ext4/hash.c:221:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/ext4/ialloc.c:66:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:66:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:172:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:172:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:543:19: warning: Division by zero [clang-analyzer-core.DivideZero]
--
^
fs/ext4/ialloc.c:457:8: note: Assuming the condition is true
((parent == d_inode(sb->s_root)) ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:457:39: note: Left side of '||' is true
((parent == d_inode(sb->s_root)) ||
^
fs/ext4/ialloc.c:462:7: note: Assuming 'qstr' is null
if (qstr) {
^~~~
fs/ext4/ialloc.c:462:3: note: Taking false branch
if (qstr) {
^
fs/ext4/ialloc.c:470:15: note: 'i' is < 'ngroups'
for (i = 0; i < ngroups; i++) {
^
fs/ext4/ialloc.c:470:3: note: Loop condition is true. Entering loop body
for (i = 0; i < ngroups; i++) {
^
fs/ext4/ialloc.c:473:8: note: Assuming field 'free_inodes' is not equal to 0
if (!stats.free_inodes)
^~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:473:4: note: Taking false branch
if (!stats.free_inodes)
^
fs/ext4/ialloc.c:475:8: note: Assuming 'best_ndir' is > field 'used_dirs'
if (stats.used_dirs >= best_ndir)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:475:4: note: Taking false branch
if (stats.used_dirs >= best_ndir)
^
fs/ext4/ialloc.c:477:8: note: Assuming 'avefreei' is <= field 'free_inodes'
if (stats.free_inodes < avefreei)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:477:4: note: Taking false branch
if (stats.free_inodes < avefreei)
^
fs/ext4/ialloc.c:479:8: note: Assuming 'avefreec' is <= field 'free_clusters'
if (stats.free_clusters < avefreec)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:479:4: note: Taking false branch
if (stats.free_clusters < avefreec)
^
fs/ext4/ialloc.c:470:15: note: Assuming 'i' is >= 'ngroups'
for (i = 0; i < ngroups; i++) {
^~~~~~~~~~~
fs/ext4/ialloc.c:470:3: note: Loop condition is false. Execution continues on line 485
for (i = 0; i < ngroups; i++) {
^
fs/ext4/ialloc.c:485:7: note: 'ret' is 0
if (ret)
^~~
fs/ext4/ialloc.c:485:3: note: Taking false branch
if (ret)
^
fs/ext4/ialloc.c:488:7: note: 'flex_size' is not equal to 1
if (flex_size == 1) {
^~~~~~~~~
fs/ext4/ialloc.c:488:3: note: Taking false branch
if (flex_size == 1) {
^
fs/ext4/ialloc.c:501:15: note: 'i' is < 'flex_size'
for (i = 0; i < flex_size; i++) {
^
fs/ext4/ialloc.c:501:3: note: Loop condition is true. Entering loop body
for (i = 0; i < flex_size; i++) {
^
fs/ext4/ialloc.c:502:8: note: Assuming the condition is true
if (grp+i >= real_ngroups)
^~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:502:4: note: Taking true branch
if (grp+i >= real_ngroups)
^
fs/ext4/ialloc.c:503:5: note: Execution continues on line 510
break;
^
fs/ext4/ialloc.c:510:3: note: Control jumps to line 542
goto fallback;
^
fs/ext4/ialloc.c:542:2: note: The value 0 is assigned to 'ngroups'
ngroups = real_ngroups;
^~~~~~~~~~~~~~~~~~~~~~
fs/ext4/ialloc.c:543:19: note: Division by zero
avefreei = freei / ngroups;
~~~~~~^~~~~~~~~
fs/ext4/ialloc.c:1255:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
fs/ext4/ialloc.c:1255:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/video/fbdev/core/fbcon.c:1037:2: warning: Value stored to 'cap' is never read [clang-analyzer-deadcode.DeadStores]
cap = info->flags;
^ ~~~~~~~~~~~
drivers/video/fbdev/core/fbcon.c:1037:2: note: Value stored to 'cap' is never read
cap = info->flags;
^ ~~~~~~~~~~~
>> drivers/video/fbdev/core/fbcon.c:2118:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
drivers/video/fbdev/core/fbcon.c:2118:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
>> drivers/video/fbdev/core/fbcon.c:2307:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2307:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2308:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data + j, 0, 32 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2308:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data + j, 0, 32 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2318:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2318:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2319:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data + j, 0, 64 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2319:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data + j, 0, 64 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2334:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, 3 * (32 - j));
^~~~~~
drivers/video/fbdev/core/fbcon.c:2334:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, 3 * (32 - j));
^~~~~~
drivers/video/fbdev/core/fbcon.c:2343:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2343:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, fontdata, j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2344:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data + j, 0, 128 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2344:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data + j, 0, 128 - j);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2500:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_data, 0, FONT_EXTRA_WORDS * sizeof(int));
^~~~~~
drivers/video/fbdev/core/fbcon.c:2500:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_data, 0, FONT_EXTRA_WORDS * sizeof(int));
^~~~~~
drivers/video/fbdev/core/fbcon.c:2506:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_data + i*h*pitch, data + i*32*pitch, h*pitch);
^~~~~~
drivers/video/fbdev/core/fbcon.c:2506:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_data + i*h*pitch, data + i*32*pitch, h*pitch);
^~~~~~
>> drivers/video/fbdev/core/fbcon.c:3170:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%d\n", rotate);
^~~~~~~~
drivers/video/fbdev/core/fbcon.c:3170:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%d\n", rotate);
^~~~~~~~
drivers/video/fbdev/core/fbcon.c:3195:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%d\n", blink);
^~~~~~~~
drivers/video/fbdev/core/fbcon.c:3195:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%d\n", blink);
^~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/leds/leds-lm3530.c:236:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&als, 0, sizeof(struct lm3530_als_data));
^~~~~~
drivers/leds/leds-lm3530.c:236:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&als, 0, sizeof(struct lm3530_als_data));
^~~~~~
drivers/leds/leds-lm3530.c:359:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "[%s] ", mode_map[i].mode);
^~~~~~~
drivers/leds/leds-lm3530.c:359:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "[%s] ", mode_map[i].mode);
^~~~~~~
drivers/leds/leds-lm3530.c:361:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s ", mode_map[i].mode);
^~~~~~~
drivers/leds/leds-lm3530.c:361:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s ", mode_map[i].mode);
^~~~~~~
drivers/leds/leds-lm3530.c:363:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "\n");
^~~~~~~
drivers/leds/leds-lm3530.c:363:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "\n");
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/hid/hid-wiimote-modules.c:353:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, namesz, "%s:blue:p%lu", dev_name(dev), ops->arg);
^~~~~~~~
drivers/hid/hid-wiimote-modules.c:353:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, namesz, "%s:blue:p%lu", dev_name(dev), ops->arg);
^~~~~~~~
drivers/hid/hid-wiimote-modules.c:1456:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(&out[ret], "%04x\n", val);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1456:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(&out[ret], "%04x\n", val);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1458:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(&out[ret], "%04x:", val);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1458:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(&out[ret], "%04x:", val);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1821:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r += sprintf(&out[r], "%+06hd:", wdata->state.calib_pro_sticks[0]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1821:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r += sprintf(&out[r], "%+06hd:", wdata->state.calib_pro_sticks[0]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1822:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r += sprintf(&out[r], "%+06hd ", wdata->state.calib_pro_sticks[1]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1822:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r += sprintf(&out[r], "%+06hd ", wdata->state.calib_pro_sticks[1]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1823:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r += sprintf(&out[r], "%+06hd:", wdata->state.calib_pro_sticks[2]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1823:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r += sprintf(&out[r], "%+06hd:", wdata->state.calib_pro_sticks[2]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1824:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r += sprintf(&out[r], "%+06hd\n", wdata->state.calib_pro_sticks[3]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1824:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r += sprintf(&out[r], "%+06hd\n", wdata->state.calib_pro_sticks[3]);
^~~~~~~
drivers/hid/hid-wiimote-modules.c:1842:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sscanf(buf, "%hd:%hd %hd:%hd", &x1, &y1, &x2, &y2);
^~~~~~
drivers/hid/hid-wiimote-modules.c:1842:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
r = sscanf(buf, "%hd:%hd %hd:%hd", &x1, &y1, &x2, &y2);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/hwmon/gsc-hwmon.c:68:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret * 10);
^~~~~~~
drivers/hwmon/gsc-hwmon.c:68:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret * 10);
--
^~~~~~~
drivers/regulator/virtual.c:218:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "fast\n");
^~~~~~~
drivers/regulator/virtual.c:218:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "fast\n");
^~~~~~~
drivers/regulator/virtual.c:220:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "normal\n");
^~~~~~~
drivers/regulator/virtual.c:220:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "normal\n");
^~~~~~~
drivers/regulator/virtual.c:222:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "idle\n");
^~~~~~~
drivers/regulator/virtual.c:222:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "idle\n");
^~~~~~~
drivers/regulator/virtual.c:224:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "standby\n");
^~~~~~~
drivers/regulator/virtual.c:224:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "standby\n");
^~~~~~~
drivers/regulator/virtual.c:226:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "unknown\n");
^~~~~~~
drivers/regulator/virtual.c:226:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "unknown\n");
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/mtd/ssfdc.c:337:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ssfdc->logic_block_map, 0xff, sizeof(ssfdc->logic_block_map[0]) *
^~~~~~
drivers/mtd/ssfdc.c:337:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ssfdc->logic_block_map, 0xff, sizeof(ssfdc->logic_block_map[0]) *
^~~~~~
drivers/mtd/ssfdc.c:400:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xff, SECTOR_SIZE);
^~~~~~
drivers/mtd/ssfdc.c:400:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xff, SECTOR_SIZE);
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/mtd/sm_ftl.c:47:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(buf, sm_attr->data, sm_attr->len);
^~~~~~~
drivers/mtd/sm_ftl.c:47:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(buf, sm_attr->data, sm_attr->len);
^~~~~~~
drivers/mtd/sm_ftl.c:250:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0xFF, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:250:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0xFF, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:379:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&oob, 0xFF, SM_OOB_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:379:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&oob, 0xFF, SM_OOB_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:441:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&oob, 0xFF, SM_OOB_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:441:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&oob, 0xFF, SM_OOB_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:768:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(zone->lba_to_phys_table, -1, ftl->max_lba * 2);
^~~~~~
drivers/mtd/sm_ftl.c:768:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(zone->lba_to_phys_table, -1, ftl->max_lba * 2);
^~~~~~
drivers/mtd/sm_ftl.c:913:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ftl->cache_data + boffset, buffer, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:913:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ftl->cache_data + boffset, buffer, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:925:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, ftl->cache_data + boffset, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:925:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, ftl->cache_data + boffset, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:1042:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xFF, SM_SECTOR_SIZE);
^~~~~~
drivers/mtd/sm_ftl.c:1042:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xFF, SM_SECTOR_SIZE);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
107 warnings generated.
>> drivers/scsi/ufs/ufshcd.c:1166:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_pwr_info, &hba->clk_scaling.saved_pwr_info.info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:1166:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_pwr_info, &hba->clk_scaling.saved_pwr_info.info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:1169:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_pwr_info, &hba->pwr_info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:1169:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_pwr_info, &hba->pwr_info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:1175:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hba->clk_scaling.saved_pwr_info.info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:1175:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hba->clk_scaling.saved_pwr_info.info,
^~~~~~
>> drivers/scsi/ufs/ufshcd.c:1388:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stat, 0, sizeof(*stat));
^~~~~~
drivers/scsi/ufs/ufshcd.c:1388:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stat, 0, sizeof(*stat));
^~~~~~
>> drivers/scsi/ufs/ufshcd.c:1601:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(wq_name, sizeof(wq_name), "ufs_clkscaling_%d",
^~~~~~~~
drivers/scsi/ufs/ufshcd.c:1601:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(wq_name, sizeof(wq_name), "ufs_clkscaling_%d",
^~~~~~~~
drivers/scsi/ufs/ufshcd.c:1951:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(wq_name, ARRAY_SIZE(wq_name), "ufs_clk_gating_%d",
^~~~~~~~
drivers/scsi/ufs/ufshcd.c:1951:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(wq_name, ARRAY_SIZE(wq_name), "ufs_clk_gating_%d",
^~~~~~~~
drivers/scsi/ufs/ufshcd.c:2138:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lrbp->sense_buffer, lrbp->ucd_rsp_ptr->sr.sense_data,
^~~~~~
drivers/scsi/ufs/ufshcd.c:2138:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(lrbp->sense_buffer, lrbp->ucd_rsp_ptr->sr.sense_data,
^~~~~~
drivers/scsi/ufs/ufshcd.c:2154:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&query_res->upiu_res, &lrbp->ucd_rsp_ptr->qr, QUERY_OSF_SIZE);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2154:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&query_res->upiu_res, &lrbp->ucd_rsp_ptr->qr, QUERY_OSF_SIZE);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2170:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hba->dev_cmd.query.descriptor, descp, resp_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2170:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hba->dev_cmd.query.descriptor, descp, resp_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2532:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ucd_req_ptr->sc.cdb, 0, UFS_CDB_SIZE);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2532:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ucd_req_ptr->sc.cdb, 0, UFS_CDB_SIZE);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2533:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ucd_req_ptr->sc.cdb, cmd->cmnd, cdb_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2533:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ucd_req_ptr->sc.cdb, cmd->cmnd, cdb_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2535:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2535:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2567:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ucd_req_ptr->qr, &query->request.upiu_req,
^~~~~~
drivers/scsi/ufs/ufshcd.c:2567:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ucd_req_ptr->qr, &query->request.upiu_req,
^~~~~~
drivers/scsi/ufs/ufshcd.c:2572:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ucd_req_ptr + 1, query->descriptor, len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2572:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ucd_req_ptr + 1, query->descriptor, len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:2574:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2574:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2581:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ucd_req_ptr, 0, sizeof(struct utp_upiu_req));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2581:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ucd_req_ptr, 0, sizeof(struct utp_upiu_req));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2591:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:2591:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:3021:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(*request, 0, sizeof(struct ufs_query_req));
^~~~~~
drivers/scsi/ufs/ufshcd.c:3021:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(*request, 0, sizeof(struct ufs_query_req));
^~~~~~
drivers/scsi/ufs/ufshcd.c:3022:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(*response, 0, sizeof(struct ufs_query_res));
^~~~~~
drivers/scsi/ufs/ufshcd.c:3022:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(*response, 0, sizeof(struct ufs_query_res));
^~~~~~
drivers/scsi/ufs/ufshcd.c:3424:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param_read_buf, &desc_buf[param_offset],
^~~~~~
drivers/scsi/ufs/ufshcd.c:3424:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param_read_buf, &desc_buf[param_offset],
^~~~~~
drivers/scsi/ufs/ufshcd.c:4379:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hba->pwr_info, pwr_mode,
^~~~~~
drivers/scsi/ufs/ufshcd.c:4379:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hba->pwr_info, pwr_mode,
--
^
drivers/scsi/ufs/ufshcd.c:5250:43: note: Assuming field 'active_uic_cmd' is null
if ((intr_status & UIC_COMMAND_COMPL) && hba->active_uic_cmd) {
^~~~~~~~~~~~~~~~~~~
drivers/scsi/ufs/ufshcd.c:5250:6: note: Assuming pointer value is null
if ((intr_status & UIC_COMMAND_COMPL) && hba->active_uic_cmd) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/ufs/ufshcd.c:5250:2: note: Taking false branch
if ((intr_status & UIC_COMMAND_COMPL) && hba->active_uic_cmd) {
^
drivers/scsi/ufs/ufshcd.c:5261:7: note: Assuming the condition is true
if ((intr_status & UFSHCD_UIC_PWR_MASK) && hba->uic_async_done) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/ufs/ufshcd.c:5261:6: note: Left side of '&&' is true
if ((intr_status & UFSHCD_UIC_PWR_MASK) && hba->uic_async_done) {
^
drivers/scsi/ufs/ufshcd.c:5261:45: note: Assuming field 'uic_async_done' is non-null
if ((intr_status & UFSHCD_UIC_PWR_MASK) && hba->uic_async_done) {
^~~~~~~~~~~~~~~~~~~
drivers/scsi/ufs/ufshcd.c:5261:2: note: Taking true branch
if ((intr_status & UFSHCD_UIC_PWR_MASK) && hba->uic_async_done) {
^
drivers/scsi/ufs/ufshcd.c:5262:35: note: Access to field 'cmd_active' results in a dereference of a null pointer (loaded from field 'active_uic_cmd')
hba->active_uic_cmd->cmd_active = 0;
~~~~~~~~~~~~~~ ^
drivers/scsi/ufs/ufshcd.c:6633:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hba->utmrdl_base_addr + task_tag, treq, sizeof(*treq));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6633:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hba->utmrdl_base_addr + task_tag, treq, sizeof(*treq));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6660:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(treq, hba->utmrdl_base_addr + task_tag, sizeof(*treq));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6660:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(treq, hba->utmrdl_base_addr + task_tag, sizeof(*treq));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6780:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lrbp->ucd_req_ptr, req_upiu, sizeof(*lrbp->ucd_req_ptr));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6780:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(lrbp->ucd_req_ptr, req_upiu, sizeof(*lrbp->ucd_req_ptr));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6786:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lrbp->ucd_req_ptr + 1, desc_buff, *buff_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:6786:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(lrbp->ucd_req_ptr + 1, desc_buff, *buff_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:6790:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6790:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lrbp->ucd_rsp_ptr, 0, sizeof(struct utp_upiu_rsp));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6805:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rsp_upiu, lrbp->ucd_rsp_ptr, sizeof(*rsp_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6805:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rsp_upiu, lrbp->ucd_rsp_ptr, sizeof(*rsp_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6812:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(desc_buff, descp, resp_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:6812:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(desc_buff, descp, resp_len);
^~~~~~
drivers/scsi/ufs/ufshcd.c:6875:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&treq.upiu_req, req_upiu, sizeof(*req_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6875:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&treq.upiu_req, req_upiu, sizeof(*req_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6888:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rsp_upiu, &treq.upiu_rsp, sizeof(*rsp_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:6888:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rsp_upiu, &treq.upiu_rsp, sizeof(*rsp_upiu));
^~~~~~
drivers/scsi/ufs/ufshcd.c:8011:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hba->clk_scaling.saved_pwr_info.info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:8011:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hba->clk_scaling.saved_pwr_info.info,
^~~~~~
drivers/scsi/ufs/ufshcd.c:9583:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(eh_wq_name, sizeof(eh_wq_name), "ufs_eh_wq_%d",
^~~~~~~~
drivers/scsi/ufs/ufshcd.c:9583:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(eh_wq_name, sizeof(eh_wq_name), "ufs_eh_wq_%d",
^~~~~~~~
Suppressed 73 warnings (73 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
>> drivers/fpga/dfl-afu-error.c:128:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%llx\n", (unsigned long long)error);
^~~~~~~
drivers/fpga/dfl-afu-error.c:128:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%llx\n", (unsigned long long)error);
^~~~~~~
drivers/fpga/dfl-afu-error.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%llx\n", (unsigned long long)error);
^~~~~~~
drivers/fpga/dfl-afu-error.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%llx\n", (unsigned long long)error);
^~~~~~~
drivers/fpga/dfl-afu-error.c:178:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%016llx%016llx\n",
^~~~~~~
drivers/fpga/dfl-afu-error.c:178:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%016llx%016llx\n",
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/tuners/tda8290.c:752:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.analog_ops, &tda8290_ops,
^~~~~~
drivers/media/tuners/tda8290.c:752:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.analog_ops, &tda8290_ops,
^~~~~~
drivers/media/tuners/tda8290.c:758:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.analog_ops, &tda8295_ops,
^~~~~~
drivers/media/tuners/tda8290.c:758:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.analog_ops, &tda8295_ops,
^~~~~~
drivers/media/tuners/tda8290.c:813:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fe->ops.analog_ops, 0, sizeof(struct analog_demod_ops));
^~~~~~
drivers/media/tuners/tda8290.c:813:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fe->ops.analog_ops, 0, sizeof(struct analog_demod_ops));
^~~~~~
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> drivers/rtc/rtc-isl12026.c:355:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(payload + 2, v + num_written, chunk_size);
^~~~~~
drivers/rtc/rtc-isl12026.c:355:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(payload + 2, v + num_written, chunk_size);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/mtd/nand/raw/brcmnand/brcmnand.c:1996:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(*desc));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:1996:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(*desc));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2212:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oob, 0x99, mtd->oobsize);
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2212:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oob, 0x99, mtd->oobsize);
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2259:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = brcmnand_read_by_pio(mtd, chip, addr, trans, buf,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2259:4: note: Value stored to 'err' is never read
err = brcmnand_read_by_pio(mtd, chip, addr, trans, buf,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf,
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf,
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", Hamming ECC");
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", Hamming ECC");
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", BCH-%u", cfg->ecc_level);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", BCH-%u", cfg->ecc_level);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cfg, 0, sizeof(*cfg));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cfg, 0, sizeof(*cfg));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
lib/raid6/algos.c:149:6: warning: Value stored to 'start' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int start = (disks>>1)-1, stop = disks-3; /* work on the second half of the disks */
^~~~~ ~~~~~~~~~~~~
lib/raid6/algos.c:149:6: note: Value stored to 'start' during its initialization is never read
int start = (disks>>1)-1, stop = disks-3; /* work on the second half of the disks */
^~~~~ ~~~~~~~~~~~~
lib/raid6/algos.c:149:28: warning: Value stored to 'stop' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int start = (disks>>1)-1, stop = disks-3; /* work on the second half of the disks */
^~~~ ~~~~~~~
lib/raid6/algos.c:149:28: note: Value stored to 'stop' during its initialization is never read
int start = (disks>>1)-1, stop = disks-3; /* work on the second half of the disks */
^~~~ ~~~~~~~
lib/raid6/algos.c:153:7: warning: Value stored to 'bestgenperf' is never read [clang-analyzer-deadcode.DeadStores]
for (bestgenperf = 0, best = NULL, algo = raid6_algos; *algo; algo++) {
^ ~
lib/raid6/algos.c:153:7: note: Value stored to 'bestgenperf' is never read
for (bestgenperf = 0, best = NULL, algo = raid6_algos; *algo; algo++) {
^ ~
lib/raid6/algos.c:255:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, raid6_gfmul, 65536);
^~~~~~
lib/raid6/algos.c:255:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, raid6_gfmul, 65536);
^~~~~~
lib/raid6/algos.c:260:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, raid6_gfmul, (disks - 2) * PAGE_SIZE % 65536);
^~~~~~
lib/raid6/algos.c:260:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, raid6_gfmul, (disks - 2) * PAGE_SIZE % 65536);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^
drivers/media/dvb-core/dvb_ca_en50221.c:686:7: note: Assuming 'status' is >= 0
if (status < 0)
^~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:686:3: note: Taking false branch
if (status < 0)
^
drivers/media/dvb-core/dvb_ca_en50221.c:691:7: note: Assuming 'status' is >= 0
if (status < 0)
^~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:691:3: note: Taking false branch
if (status < 0)
^
drivers/media/dvb-core/dvb_ca_en50221.c:696:8: note: 'ebuf' is non-null
if (!ebuf) {
^~~~
drivers/media/dvb-core/dvb_ca_en50221.c:696:3: note: Taking false branch
if (!ebuf) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:713:8: note: Assuming 'bytes_read' is <= 'ecount'
if (bytes_read > ecount) {
^~~~~~~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:713:4: note: Taking false branch
if (bytes_read > ecount) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:722:15: note: Assuming 'i' is >= 'bytes_read'
for (i = 0; i < bytes_read; i++) {
^~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:722:3: note: Loop condition is false. Execution continues on line 734
for (i = 0; i < bytes_read; i++) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:736:7: note: Assuming 'status' is >= 0
if (status < 0)
^~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:736:3: note: Taking false branch
if (status < 0)
^
drivers/media/dvb-core/dvb_ca_en50221.c:738:7: note: Assuming the condition is false
if (status & STATUSREG_RE) {
^~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:738:3: note: Taking false branch
if (status & STATUSREG_RE) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:749:7: note: 'ebuf' is non-null
if (!ebuf) {
^~~~
drivers/media/dvb-core/dvb_ca_en50221.c:749:2: note: Taking false branch
if (!ebuf) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:759:2: note: Assuming 'dvb_ca_en50221_debug' is 0
dprintk("Received CA packet for slot %i connection id 0x%x last_frag:%i size:0x%x\n", slot,
^
drivers/media/dvb-core/dvb_ca_en50221.c:39:6: note: expanded from macro 'dprintk'
if (dvb_ca_en50221_debug) \
^~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:759:2: note: Taking false branch
dprintk("Received CA packet for slot %i connection id 0x%x last_frag:%i size:0x%x\n", slot,
^
drivers/media/dvb-core/dvb_ca_en50221.c:39:2: note: expanded from macro 'dprintk'
if (dvb_ca_en50221_debug) \
^
drivers/media/dvb-core/dvb_ca_en50221.c:759:2: note: Loop condition is false. Exiting loop
dprintk("Received CA packet for slot %i connection id 0x%x last_frag:%i size:0x%x\n", slot,
^
drivers/media/dvb-core/dvb_ca_en50221.c:38:30: note: expanded from macro 'dprintk'
#define dprintk(fmt, arg...) do { \
^
drivers/media/dvb-core/dvb_ca_en50221.c:763:14: note: The left operand of '&' is a garbage value
if ((buf[1] & 0x80) == 0x00)
~~~~~~ ^
drivers/media/dvb-core/dvb_ca_en50221.c:1886:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sl, 0, sizeof(struct dvb_ca_slot));
^~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:1886:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sl, 0, sizeof(struct dvb_ca_slot));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
drivers/hwmon/aspeed-pwm-tacho.c:602:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", priv->pwm_port_fan_ctrl[index]);
^~~~~~~
drivers/hwmon/aspeed-pwm-tacho.c:602:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", priv->pwm_port_fan_ctrl[index]);
^~~~~~~
drivers/hwmon/aspeed-pwm-tacho.c:617:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", rpm);
^~~~~~~
drivers/hwmon/aspeed-pwm-tacho.c:617:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", rpm);
^~~~~~~
drivers/hwmon/aspeed-pwm-tacho.c:828:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cdev->name, MAX_CDEV_NAME_LEN, "%pOFn%d", child, pwm_port);
^~~~~~~~
drivers/hwmon/aspeed-pwm-tacho.c:828:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cdev->name, MAX_CDEV_NAME_LEN, "%pOFn%d", child, pwm_port);
^~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> drivers/input/mouse/trackpoint.c:114:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", value);
^~~~~~~
drivers/input/mouse/trackpoint.c:114:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", value);
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/hpfs/ea.c:89:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, ea_data(ea), ea_valuelen(ea));
^~~~~~
fs/hpfs/ea.c:89:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, ea_data(ea), ea_valuelen(ea));
^~~~~~
fs/hpfs/ea.c:146:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ret, ea_data(ea), ea_valuelen(ea));
^~~~~~
fs/hpfs/ea.c:146:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ret, ea_data(ea), ea_valuelen(ea));
^~~~~~
fs/hpfs/ea.c:207:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ea_data(ea), data, size);
^~~~~~
fs/hpfs/ea.c:207:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ea_data(ea), data, size);
^~~~~~
fs/hpfs/ea.c:260:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(ea->name, key);
^~~~~~
fs/hpfs/ea.c:260:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(ea->name, key);
^~~~~~
fs/hpfs/ea.c:261:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ea_data(ea), data, size);
^~~~~~
fs/hpfs/ea.c:261:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ea_data(ea), data, size);
^~~~~~
fs/hpfs/ea.c:276:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, fnode_ea(fnode), le16_to_cpu(fnode->ea_size_s));
^~~~~~
fs/hpfs/ea.c:276:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, fnode_ea(fnode), le16_to_cpu(fnode->ea_size_s));
^~~~~~
fs/hpfs/ea.c:332:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b2, b1, 512);
^~~~~~
fs/hpfs/ea.c:332:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b2, b1, 512);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
net/ethtool/common.c:452:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/common.c:452:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/common.c:545:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
net/ethtool/common.c:545:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, sizeof(*info));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
Suppressed 98 warnings (97 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
net/netfilter/nf_log.c:226:3: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(prefix, sizeof(prefix), fmt, args);
^~~~~~~~~
net/netfilter/nf_log.c:226:3: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(prefix, sizeof(prefix), fmt, args);
^~~~~~~~~
net/netfilter/nf_log.c:250:3: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(prefix, sizeof(prefix), fmt, args);
^~~~~~~~~
net/netfilter/nf_log.c:250:3: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(prefix, sizeof(prefix), fmt, args);
^~~~~~~~~
net/netfilter/nf_log.c:273:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(m->buf + m->count, S_SIZE - m->count, f, args);
^~~~~~~~~
net/netfilter/nf_log.c:273:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(m->buf + m->count, S_SIZE - m->count, f, args);
^~~~~~~~~
net/netfilter/nf_log.c:318:14: warning: Value stored to 'net' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net *net = seq_file_net(seq);
^~~ ~~~~~~~~~~~~~~~~~
net/netfilter/nf_log.c:318:14: note: Value stored to 'net' during its initialization is never read
struct net *net = seq_file_net(seq);
^~~ ~~~~~~~~~~~~~~~~~
net/netfilter/nf_log.c:330:14: warning: Value stored to 'net' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net *net = seq_file_net(s);
^~~ ~~~~~~~~~~~~~~~
net/netfilter/nf_log.c:330:14: note: Value stored to 'net' during its initialization is never read
struct net *net = seq_file_net(s);
^~~ ~~~~~~~~~~~~~~~
net/netfilter/nf_log.c:470:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(nf_log_sysctl_fnames[i],
^~~~~~~~
net/netfilter/nf_log.c:470:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(nf_log_sysctl_fnames[i],
^~~~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/media/tuners/tea5767.c:289:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, 5);
^~~~~~
drivers/media/tuners/tea5767.c:289:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, 5);
^~~~~~
>> drivers/media/tuners/tea5767.c:419:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->ctrl, priv_cfg, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tea5767.c:419:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->ctrl, priv_cfg, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tea5767.c:460:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &tea5767_tuner_ops,
^~~~~~
drivers/media/tuners/tea5767.c:460:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &tea5767_tuner_ops,
^~~~~~
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/watchdog/ziirave_wdt.c:244:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(packet + 3, data, len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:244:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(packet + 3, data, len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:245:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(packet + 3 + len, 0, ZIIRAVE_FIRM_PKT_DATA_SIZE - len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:245:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(packet + 3 + len, 0, ZIIRAVE_FIRM_PKT_DATA_SIZE - len);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/md/raid0.c:51:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(line+len, 200-len, "%s%s", k?"/":"",
^~~~~~~~
drivers/md/raid0.c:51:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(line+len, 200-len, "%s%s", k?"/":"",
^~~~~~~~
drivers/md/raid0.c:332:3: warning: Division by zero [clang-analyzer-core.DivideZero]
sector_div(chunk, chunk_sects * zone->nb_dev);
^
include/linux/math.h:121:26: note: expanded from macro 'sector_div'
#define sector_div(a, b) do_div(a, b)
^~~~~~~~~~~~
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
~~~~~~~~~~~~~~^~~~~~~~
drivers/md/raid0.c:320:6: note: Calling 'is_power_of_2'
if (is_power_of_2(chunk_sects)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:47:10: note: Assuming 'n' is equal to 0
return (n != 0 && ((n & (n - 1)) == 0));
^~~~~~
include/linux/log2.h:47:17: note: Left side of '&&' is false
return (n != 0 && ((n & (n - 1)) == 0));
^
include/linux/log2.h:47:2: note: Returning zero, which participates in a condition later
return (n != 0 && ((n & (n - 1)) == 0));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/raid0.c:320:6: note: Returning from 'is_power_of_2'
if (is_power_of_2(chunk_sects)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/raid0.c:320:2: note: Taking false branch
if (is_power_of_2(chunk_sects)) {
^
drivers/md/raid0.c:330:19: note: Left side of '&&' is false
sect_in_chunk = sector_div(sector, chunk_sects);
^
include/linux/math.h:121:26: note: expanded from macro 'sector_div'
#define sector_div(a, b) do_div(a, b)
^
include/asm-generic/div64.h:223:35: note: expanded from macro 'do_div'
if (__builtin_constant_p(__base) && \
^
drivers/md/raid0.c:330:19: note: Left side of '&&' is false
sect_in_chunk = sector_div(sector, chunk_sects);
^
include/linux/math.h:121:26: note: expanded from macro 'sector_div'
#define sector_div(a, b) do_div(a, b)
^
include/asm-generic/div64.h:227:42: note: expanded from macro 'do_div'
} else if (__builtin_constant_p(__base) && \
^
drivers/md/raid0.c:330:19: note: Assuming the condition is false
sect_in_chunk = sector_div(sector, chunk_sects);
^
include/linux/math.h:121:26: note: expanded from macro 'sector_div'
#define sector_div(a, b) do_div(a, b)
^~~~~~~~~~~~
include/asm-generic/div64.h:234:20: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
~~~~~~~^~~~~~~~~~~~~~~~~
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
drivers/md/raid0.c:330:19: note: Taking false branch
sect_in_chunk = sector_div(sector, chunk_sects);
^
include/linux/math.h:121:26: note: expanded from macro 'sector_div'
#define sector_div(a, b) do_div(a, b)
--
^~~~~~~
drivers/hwmon/atxp1.c:83:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size = sprintf(buf, "%d\n", vid_from_reg(data->reg.vid & ATXP1_VIDMASK,
^~~~~~~
drivers/hwmon/atxp1.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size = sprintf(buf, "0x%02x\n", data->reg.gpio1 & ATXP1_GPIO1MASK);
^~~~~~~
drivers/hwmon/atxp1.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size = sprintf(buf, "0x%02x\n", data->reg.gpio1 & ATXP1_GPIO1MASK);
^~~~~~~
drivers/hwmon/atxp1.c:204:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size = sprintf(buf, "0x%02x\n", data->reg.gpio2);
^~~~~~~
drivers/hwmon/atxp1.c:204:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size = sprintf(buf, "0x%02x\n", data->reg.gpio2);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/hwmon/smsc47b397.c:164:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp_from_reg(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/smsc47b397.c:164:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp_from_reg(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/smsc47b397.c:188:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", fan_from_reg(data->fan[attr->index]));
^~~~~~~
drivers/hwmon/smsc47b397.c:188:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", fan_from_reg(data->fan[attr->index]));
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/hwmon/smsc47m192.c:175:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", IN_FROM_REG(data->in[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:175:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", IN_FROM_REG(data->in[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:184:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", IN_FROM_REG(data->in_min[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:184:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", IN_FROM_REG(data->in_min[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:193:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", IN_FROM_REG(data->in_max[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:193:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", IN_FROM_REG(data->in_max[nr], nr));
^~~~~~~
drivers/hwmon/smsc47m192.c:272:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:272:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:281:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_min[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:281:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_min[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:290:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_max[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:290:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_max[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:345:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_offset[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:345:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_offset[nr]));
^~~~~~~
drivers/hwmon/smsc47m192.c:404:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/smsc47m192.c:404:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/smsc47m192.c:412:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->vrm);
^~~~~~~
drivers/hwmon/smsc47m192.c:412:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->vrm);
^~~~~~~
drivers/hwmon/smsc47m192.c:440:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->alarms & nr) ? 1 : 0);
^~~~~~~
drivers/hwmon/smsc47m192.c:440:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->alarms & nr) ? 1 : 0);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> drivers/hwmon/occ/p8_i2c.c:76:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[1], &data[4], sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:76:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[1], &data[4], sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:77:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], data, sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:77:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], data, sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:93:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &data0, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:93:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &data0, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:94:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 4, &data1, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:94:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 4, &data1, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:104:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data0, data, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:104:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data0, data, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:107:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data1, data + 4, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:107:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data1, data + 4, min_t(size_t, len, 4));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/staging/gs_fpgaboot/gs_fpgaboot.c:37:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, bitdata + *offset, rdsize);
^~~~~~
drivers/staging/gs_fpgaboot/gs_fpgaboot.c:37:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, bitdata + *offset, rdsize);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
drivers/staging/most/net/net.c:126:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buff, skb->data + ETH_HLEN, payload_len);
^~~~~~
drivers/staging/most/net/net.c:126:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buff, skb->data + ETH_HLEN, payload_len);
^~~~~~
drivers/staging/most/net/net.c:157:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buff, skb->data, skb->len);
^~~~~~
drivers/staging/most/net/net.c:157:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buff, skb->data, skb->len);
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/ext4/indirect.c:155:47: warning: The right operand of '+' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
add_chain(chain, NULL, EXT4_I(inode)->i_data + *offsets);
^
fs/ext4/indirect.c:1236:6: note: Assuming 'end' is < 'max_block'
if (end >= max_block)
^~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1236:2: note: Taking false branch
if (end >= max_block)
^
fs/ext4/indirect.c:1238:7: note: Assuming 'start' is < 'end'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~
fs/ext4/indirect.c:1238:6: note: Left side of '||' is false
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1238:25: note: Assuming 'start' is <= 'max_block'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1238:2: note: Taking false branch
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1241:6: note: Calling 'ext4_block_to_path'
n = ext4_block_to_path(inode, start, offsets, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:6: note: Assuming 'i_block' is >= 'direct_blocks'
if (i_block < direct_blocks) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:2: note: Taking false branch
if (i_block < direct_blocks) {
^
fs/ext4/indirect.c:89:13: note: Assuming the condition is false
} else if ((i_block -= direct_blocks) < indirect_blocks) {
--
70 warnings generated.
net/batman-adv/network-coding.c:484:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key->prev_hop, src, sizeof(key->prev_hop));
^~~~~~
net/batman-adv/network-coding.c:484:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key->prev_hop, src, sizeof(key->prev_hop));
^~~~~~
net/batman-adv/network-coding.c:485:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key->next_hop, dst, sizeof(key->next_hop));
^~~~~~
net/batman-adv/network-coding.c:485:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key->next_hop, dst, sizeof(key->next_hop));
^~~~~~
net/batman-adv/network-coding.c:1649:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&coded_packet_tmp, skb->data, sizeof(coded_packet_tmp));
^~~~~~
net/batman-adv/network-coding.c:1649:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&coded_packet_tmp, skb->data, sizeof(coded_packet_tmp));
^~~~~~
net/batman-adv/network-coding.c:1650:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ðhdr_tmp, skb_mac_header(skb), sizeof(ethhdr_tmp));
^~~~~~
net/batman-adv/network-coding.c:1650:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ðhdr_tmp, skb_mac_header(skb), sizeof(ethhdr_tmp));
^~~~~~
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
Suppressed 72 warnings (72 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/leds/leds-lp3952.c:104:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(dest, str, LP3952_LABEL_MAX_LEN);
^~~~~~~
drivers/leds/leds-lp3952.c:104:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(dest, str, LP3952_LABEL_MAX_LEN);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/leds/leds-max8997.c:175:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "FLASH\n");
^~~~~~~
drivers/leds/leds-max8997.c:175:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "FLASH\n");
^~~~~~~
drivers/leds/leds-max8997.c:178:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "MOVIE\n");
^~~~~~~
drivers/leds/leds-max8997.c:178:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "MOVIE\n");
^~~~~~~
drivers/leds/leds-max8997.c:181:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "FLASH_PIN_CONTROL\n");
^~~~~~~
drivers/leds/leds-max8997.c:181:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "FLASH_PIN_CONTROL\n");
^~~~~~~
drivers/leds/leds-max8997.c:184:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "MOVIE_PIN_CONTROL\n");
^~~~~~~
drivers/leds/leds-max8997.c:184:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "MOVIE_PIN_CONTROL\n");
^~~~~~~
drivers/leds/leds-max8997.c:187:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "NONE\n");
^~~~~~~
drivers/leds/leds-max8997.c:187:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "NONE\n");
^~~~~~~
drivers/leds/leds-max8997.c:251:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "max8997-led%d", pdev->id);
^~~~~~~~
drivers/leds/leds-max8997.c:251:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "max8997-led%d", pdev->id);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
>> drivers/input/mouse/cypress_ps2.c:114:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(param, 0, pktsize);
^~~~~~
drivers/input/mouse/cypress_ps2.c:114:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(param, 0, pktsize);
^~~~~~
>> drivers/input/mouse/cypress_ps2.c:124:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param, psmouse->packet, pktsize);
^~~~~~
drivers/input/mouse/cypress_ps2.c:124:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param, psmouse->packet, pktsize);
^~~~~~
drivers/input/mouse/cypress_ps2.c:267:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(param, 0, sizeof(param));
^~~~~~
drivers/input/mouse/cypress_ps2.c:267:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(param, 0, sizeof(param));
^~~~~~
drivers/input/mouse/cypress_ps2.c:449:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(report_data, 0, sizeof(struct cytp_report_data));
^~~~~~
drivers/input/mouse/cypress_ps2.c:449:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(report_data, 0, sizeof(struct cytp_report_data));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/input/joystick/a3d.c:94:44: warning: The left operand of '<<' is a garbage value due to array index out of bounds [clang-analyzer-core.UndefinedBinaryOperatorResult]
return (csum & 0x3f) != ((data[count - 2] << 3) | data[count - 1]);
^
drivers/input/joystick/a3d.c:257:6: note: Assuming 'a3d' is non-null
if (!a3d || !input_dev) {
^~~~
drivers/input/joystick/a3d.c:257:6: note: Left side of '||' is false
drivers/input/joystick/a3d.c:257:14: note: Assuming 'input_dev' is non-null
if (!a3d || !input_dev) {
^~~~~~~~~~
drivers/input/joystick/a3d.c:257:2: note: Taking false branch
if (!a3d || !input_dev) {
^
drivers/input/joystick/a3d.c:268:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/input/joystick/a3d.c:268:2: note: Taking false branch
if (err)
^
drivers/input/joystick/a3d.c:271:6: note: Calling 'a3d_read_packet'
i = a3d_read_packet(gameport, A3D_MAX_LENGTH, data);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/joystick/a3d.c:66:2: note: Loop condition is false. Exiting loop
local_irq_save(flags);
^
include/linux/irqflags.h:221:3: note: expanded from macro 'local_irq_save'
raw_local_irq_save(flags); \
^
include/linux/irqflags.h:176:2: note: expanded from macro 'raw_local_irq_save'
do { \
^
drivers/input/joystick/a3d.c:66:2: note: Assuming the condition is false
local_irq_save(flags);
^
include/linux/irqflags.h:222:7: note: expanded from macro 'local_irq_save'
if (!raw_irqs_disabled_flags(flags)) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/joystick/a3d.c:66:2: note: Taking false branch
local_irq_save(flags);
^
include/linux/irqflags.h:222:3: note: expanded from macro 'local_irq_save'
if (!raw_irqs_disabled_flags(flags)) \
^
drivers/input/joystick/a3d.c:66:2: note: Loop condition is false. Exiting loop
local_irq_save(flags);
^
include/linux/irqflags.h:220:2: note: expanded from macro 'local_irq_save'
do { \
^
drivers/input/joystick/a3d.c:70:9: note: Assuming 't' is > 0
while (t > 0 && i < length) {
^~~~~
drivers/input/joystick/a3d.c:70:9: note: Left side of '&&' is true
drivers/input/joystick/a3d.c:70:2: note: Loop condition is true. Entering loop body
while (t > 0 && i < length) {
^
drivers/input/joystick/a3d.c:73:7: note: Assuming the condition is true
if (~v & u & 0x10) {
^~~~~~~~~~~~~
drivers/input/joystick/a3d.c:73:3: note: Taking true branch
if (~v & u & 0x10) {
^
drivers/input/joystick/a3d.c:70:9: note: Assuming 't' is <= 0
while (t > 0 && i < length) {
^~~~~
drivers/input/joystick/a3d.c:70:15: note: Left side of '&&' is false
while (t > 0 && i < length) {
^
drivers/input/joystick/a3d.c:79:2: note: Taking false branch
local_irq_restore(flags);
^
include/linux/irqflags.h:228:3: note: expanded from macro 'local_irq_restore'
if (!raw_irqs_disabled_flags(flags)) \
^
drivers/input/joystick/a3d.c:79:2: note: Assuming the condition is false
local_irq_restore(flags);
^
--
^~~~~~
drivers/mtd/ubi/vtbl.c:139:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vtbl_rec->name + re->new_name_len, 0,
^~~~~~
drivers/mtd/ubi/vtbl.c:495:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vtbl[i], &empty_vtbl_record, UBI_VTBL_RECORD_SIZE);
^~~~~~
drivers/mtd/ubi/vtbl.c:495:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vtbl[i], &empty_vtbl_record, UBI_VTBL_RECORD_SIZE);
^~~~~~
drivers/mtd/ubi/vtbl.c:546:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vol->name, vtbl[i].name, vol->name_len);
^~~~~~
drivers/mtd/ubi/vtbl.c:546:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vol->name, vtbl[i].name, vol->name_len);
^~~~~~
drivers/mtd/ubi/vtbl.c:634:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vol->name, UBI_LAYOUT_VOLUME_NAME, vol->name_len + 1);
^~~~~~
drivers/mtd/ubi/vtbl.c:634:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vol->name, UBI_LAYOUT_VOLUME_NAME, vol->name_len + 1);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/ltc2945.c:286:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_update_bits(regmap, LTC2945_CONTROL, CONTROL_TEST_MODE,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/ltc2945.c:286:2: note: Value stored to 'ret' is never read
ret = regmap_update_bits(regmap, LTC2945_CONTROL, CONTROL_TEST_MODE,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/hwmon/ltc2947-core.c:295:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(alarms, 0, sizeof(alarms));
^~~~~~
drivers/hwmon/ltc2947-core.c:295:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(alarms, 0, sizeof(alarms));
^~~~~~
drivers/hwmon/ltc2947-core.c:336:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n", val);
^~~~~~~
drivers/hwmon/ltc2947-core.c:336:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld\n", val);
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/hwmon/max1668.c:139:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:139:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:151:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp_max[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:151:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp_max[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:163:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->temp_min[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:163:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->temp_min[index] * 1000);
^~~~~~~
drivers/hwmon/max1668.c:175:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
^~~~~~~
drivers/hwmon/max1668.c:175:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
^~~~~~~
drivers/hwmon/max1668.c:187:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/hwmon/max1668.c:187:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> drivers/scsi/ufs/ufs-sysfs.c:305:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hba->monitor, 0, sizeof(hba->monitor));
^~~~~~
drivers/scsi/ufs/ufs-sysfs.c:305:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hba->monitor, 0, sizeof(hba->monitor));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/scsi/ufs/ufs_bsg.c:125:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&uc, &bsg_request->upiu_req.uc, UIC_CMD_SIZE);
^~~~~~
drivers/scsi/ufs/ufs_bsg.c:125:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&uc, &bsg_request->upiu_req.uc, UIC_CMD_SIZE);
^~~~~~
drivers/scsi/ufs/ufs_bsg.c:131:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bsg_reply->upiu_rsp.uc, &uc, UIC_CMD_SIZE);
^~~~~~
drivers/scsi/ufs/ufs_bsg.c:131:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bsg_reply->upiu_rsp.uc, &uc, UIC_CMD_SIZE);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/mtd/nand/raw/arasan-nand-controller.c:458:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(anand->hw_ecc, 0, chip->ecc.bytes);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:458:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(anand->hw_ecc, 0, chip->ecc.bytes);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:489:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(raw_buf, 0xFF, chip->ecc.size);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:489:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(raw_buf, 0xFF, chip->ecc.size);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:594:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nfc_op, 0, sizeof(*nfc_op));
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:594:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(nfc_op, 0, sizeof(*nfc_op));
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:701:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[offset], &remainder, last_len);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:701:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[offset], &remainder, last_len);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:703:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&remainder, &buf[offset], last_len);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:703:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&remainder, &buf[offset], last_len);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:816:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(subop->instrs[1].ctx.data.buf.in, &tmp, 1);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:816:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(subop->instrs[1].ctx.data.buf.in, &tmp, 1);
^~~~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1379:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return ret;
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1438:6: note: Assuming 'nfc' is non-null
if (!nfc)
^~~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1438:2: note: Taking false branch
if (!nfc)
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1447:2: note: Taking false branch
if (IS_ERR(nfc->base))
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1453:2: note: Taking false branch
if (IS_ERR(nfc->controller_clk))
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1457:2: note: Taking false branch
if (IS_ERR(nfc->bus_clk))
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1461:6: note: 'ret' is 0
if (ret)
^~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1461:2: note: Taking false branch
if (ret)
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1465:6: note: 'ret' is 0
if (ret)
^~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1465:2: note: Taking false branch
if (ret)
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1468:33: note: 64 is equal to 64
ret = dma_set_mask(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1468:33: note: '?' condition is true
ret = dma_set_mask(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1469:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/mtd/nand/raw/arasan-nand-controller.c:1469:2: note: Taking false branch
if (ret)
^
drivers/mtd/nand/raw/arasan-nand-controller.c:1473:6: note: 'ret' is 0
if (ret)
--
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/hwmon/max31730.c:219:2: note: The value -128000 is assigned to 'val'
val = clamp_val(val, MAX31730_TEMP_MIN, MAX31730_TEMP_MAX);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/max31730.c:220:30: note: The result of the left shift is undefined because the left operand is negative
val = DIV_ROUND_CLOSEST(val << 4, 1000) << 4;
^
include/linux/math.h:87:18: note: expanded from macro 'DIV_ROUND_CLOSEST'
typeof(x) __x = x; \
^
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
net/bridge/br_netlink_tunnel.c:227:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tinfo, 0, sizeof(*tinfo));
^~~~~~
net/bridge/br_netlink_tunnel.c:227:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tinfo, 0, sizeof(*tinfo));
^~~~~~
net/bridge/br_netlink_tunnel.c:294:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tinfo_last, tinfo_curr, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:294:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tinfo_last, tinfo_curr, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:321:7: warning: Branch condition evaluates to a garbage value [clang-analyzer-core.uninitialized.Branch]
if (err)
^~~
net/bridge/br_netlink_tunnel.c:289:2: note: 'err' declared without an initial value
int err;
^~~~~~~
net/bridge/br_netlink_tunnel.c:291:6: note: Assuming the condition is false
if (tinfo_curr->flags & BRIDGE_VLAN_INFO_RANGE_BEGIN) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bridge/br_netlink_tunnel.c:291:2: note: Taking false branch
if (tinfo_curr->flags & BRIDGE_VLAN_INFO_RANGE_BEGIN) {
^
net/bridge/br_netlink_tunnel.c:295:13: note: Assuming the condition is true
} else if (tinfo_curr->flags & BRIDGE_VLAN_INFO_RANGE_END) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bridge/br_netlink_tunnel.c:295:9: note: Taking true branch
} else if (tinfo_curr->flags & BRIDGE_VLAN_INFO_RANGE_END) {
^
net/bridge/br_netlink_tunnel.c:299:7: note: Assuming the condition is false
if (!(tinfo_last->flags & BRIDGE_VLAN_INFO_RANGE_BEGIN))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bridge/br_netlink_tunnel.c:299:3: note: Taking false branch
if (!(tinfo_last->flags & BRIDGE_VLAN_INFO_RANGE_BEGIN))
^
net/bridge/br_netlink_tunnel.c:301:7: note: Assuming the condition is false
if ((tinfo_curr->vid - tinfo_last->vid) !=
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bridge/br_netlink_tunnel.c:301:3: note: Taking false branch
if ((tinfo_curr->vid - tinfo_last->vid) !=
^
net/bridge/br_netlink_tunnel.c:305:29: note: Assuming 'v' is > field 'vid'
for (v = tinfo_last->vid; v <= tinfo_curr->vid; v++) {
^~~~~~~~~~~~~~~~~~~~
net/bridge/br_netlink_tunnel.c:305:3: note: Loop condition is false. Execution continues on line 318
for (v = tinfo_last->vid; v <= tinfo_curr->vid; v++) {
^
net/bridge/br_netlink_tunnel.c:318:7: note: 'v_start' is null
if (v_start && v_end)
^~~~~~~
net/bridge/br_netlink_tunnel.c:318:15: note: Left side of '&&' is false
if (v_start && v_end)
^
net/bridge/br_netlink_tunnel.c:321:7: note: Branch condition evaluates to a garbage value
if (err)
^~~
net/bridge/br_netlink_tunnel.c:324:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tinfo_last, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:324:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tinfo_last, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:325:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tinfo_curr, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:325:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tinfo_curr, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:334:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tinfo_last, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:334:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tinfo_last, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:335:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tinfo_curr, 0, sizeof(struct vtunnel_info));
^~~~~~
net/bridge/br_netlink_tunnel.c:335:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tinfo_curr, 0, sizeof(struct vtunnel_info));
^~~~~~
Suppressed 87 warnings (86 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/scsi/ufs/ufshcd-crypto.c:85:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg.crypto_key, key->raw, key->size/2);
^~~~~~
drivers/scsi/ufs/ufshcd-crypto.c:85:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg.crypto_key, key->raw, key->size/2);
^~~~~~
drivers/scsi/ufs/ufshcd-crypto.c:86:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg.crypto_key + UFS_CRYPTO_KEY_MAX_SIZE/2,
^~~~~~
drivers/scsi/ufs/ufshcd-crypto.c:86:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg.crypto_key + UFS_CRYPTO_KEY_MAX_SIZE/2,
^~~~~~
drivers/scsi/ufs/ufshcd-crypto.c:89:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg.crypto_key, key->raw, key->size);
^~~~~~
drivers/scsi/ufs/ufshcd-crypto.c:89:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg.crypto_key, key->raw, key->size);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
drivers/md/persistent-data/dm-btree-remove.c:68:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(key_ptr(n, 0),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:68:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(key_ptr(n, 0),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:71:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(value_ptr(n, 0),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:71:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(value_ptr(n, 0),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:76:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(key_ptr(n, shift),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:76:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(key_ptr(n, shift),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:79:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(value_ptr(n, shift),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:79:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(value_ptr(n, shift),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:102:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_ptr(left, nr_left),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:102:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key_ptr(left, nr_left),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:105:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value_ptr(left, nr_left),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:105:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value_ptr(left, nr_left),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:114:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_ptr(right, 0),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:114:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key_ptr(right, 0),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:117:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value_ptr(right, 0),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:117:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value_ptr(right, 0),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:135:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(key_ptr(n, index),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:135:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(key_ptr(n, index),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:139:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(value_ptr(n, index),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:139:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(value_ptr(n, index),
^~~~~~~
drivers/md/persistent-data/dm-btree-remove.c:495:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n, dm_block_data(child),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:495:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n, dm_block_data(child),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:559:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value_ptr(dm_block_data(shadow_parent(s)), i),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:559:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value_ptr(dm_block_data(shadow_parent(s)), i),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:652:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(value_ptr(dm_block_data(shadow_parent(s)), i),
^~~~~~
drivers/md/persistent-data/dm-btree-remove.c:652:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(value_ptr(dm_block_data(shadow_parent(s)), i),
--
^~~~~~~
drivers/hwmon/f71805f.c:955:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", (data->alarms >> 16) & 0x07);
^~~~~~~
drivers/hwmon/f71805f.c:955:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", (data->alarms >> 16) & 0x07);
^~~~~~~
drivers/hwmon/f71805f.c:963:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", (data->alarms >> 11) & 0x07);
^~~~~~~
drivers/hwmon/f71805f.c:963:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", (data->alarms >> 11) & 0x07);
^~~~~~~
drivers/hwmon/f71805f.c:973:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", (data->alarms >> bitnr) & 1);
^~~~~~~
drivers/hwmon/f71805f.c:973:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", (data->alarms >> bitnr) & 1);
^~~~~~~
drivers/hwmon/f71805f.c:981:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/f71805f.c:981:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
net/nfc/hci/command.c:161:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp + 1, param, param_len);
^~~~~~
net/nfc/hci/command.c:161:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp + 1, param, param_len);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
net/nfc/digital_technology.c:366:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sel_req->nfcid1, sdd_res->nfcid1, 4);
^~~~~~
net/nfc/digital_technology.c:366:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sel_req->nfcid1, sdd_res->nfcid1, 4);
^~~~~~
net/nfc/digital_technology.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target->nfcid1 + target->nfcid1_len, sdd_res->nfcid1 + offset,
^~~~~~
net/nfc/digital_technology.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target->nfcid1 + target->nfcid1_len, sdd_res->nfcid1 + offset,
^~~~~~
net/nfc/digital_technology.c:627:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(attrib_req->nfcid0, sensb_res->nfcid0,
^~~~~~
net/nfc/digital_technology.c:627:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(attrib_req->nfcid0, sensb_res->nfcid0,
^~~~~~
net/nfc/digital_technology.c:771:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&target, 0, sizeof(struct nfc_target));
^~~~~~
net/nfc/digital_technology.c:771:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&target, 0, sizeof(struct nfc_target));
^~~~~~
net/nfc/digital_technology.c:775:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target.sensf_res, sensf_res, resp->len);
^~~~~~
net/nfc/digital_technology.c:775:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target.sensf_res, sensf_res, resp->len);
^~~~~~
net/nfc/digital_technology.c:778:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target.nfcid2, sensf_res->nfcid2, NFC_NFCID2_MAXSIZE);
^~~~~~
net/nfc/digital_technology.c:778:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target.nfcid2, sensf_res->nfcid2, NFC_NFCID2_MAXSIZE);
^~~~~~
net/nfc/digital_technology.c:874:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target->iso15693_uid, &res->uid, sizeof(target->iso15693_uid));
^~~~~~
net/nfc/digital_technology.c:874:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target->iso15693_uid, &res->uid, sizeof(target->iso15693_uid));
^~~~~~
net/nfc/digital_technology.c:1142:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sensf_res, 0, size);
^~~~~~
net/nfc/digital_technology.c:1142:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sensf_res, 0, size);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
>> drivers/extcon/extcon-usbc-cros-ec.c:81:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/extcon/extcon-usbc-cros-ec.c:81:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->data, outdata, outsize);
^~~~~~
drivers/extcon/extcon-usbc-cros-ec.c:85:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(indata, msg->data, insize);
^~~~~~
drivers/extcon/extcon-usbc-cros-ec.c:85:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(indata, msg->data, insize);
^~~~~~
Suppressed 23 warnings (16 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/siox/siox-core.c:150:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:150:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:240:4: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:240:4: note: Value stored to 'status' is never read
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:389:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:389:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:399:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:399:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:426:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:426:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:443:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:443:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:460:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:460:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:477:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:477:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:559:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:559:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:601:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:601:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:637:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n", jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
drivers/siox/siox-core.c:637:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld\n", jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/md/persistent-data/dm-btree-spine.c:251:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&v1_le, value1_le, sizeof(v1_le));
^~~~~~
drivers/md/persistent-data/dm-btree-spine.c:251:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&v1_le, value1_le, sizeof(v1_le));
--
drivers/staging/greybus/hid.c:414:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(hid->name, sizeof(hid->name), "%s %04X:%04X",
^~~~~~~~
drivers/staging/greybus/hid.c:414:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(hid->name, sizeof(hid->name), "%s %04X:%04X",
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/staging/greybus/power_supply.c:457:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(name, len, "%s_%u", init_name, ++i);
^~~~~~~~
drivers/staging/greybus/power_supply.c:457:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(name, len, "%s_%u", init_name, ++i);
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
56 warnings generated.
84 warnings generated.
112 warnings generated.
140 warnings generated.
168 warnings generated.
196 warnings generated.
224 warnings generated.
drivers/mtd/tests/mtd_test.c:16:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/tests/mtd_test.c:16:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
Suppressed 216 warnings (216 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/mtd/tests/mtd_nandecctest.c:52:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:52:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:66:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:66:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:93:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:93:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:107:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:107:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:115:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:115:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:116:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:116:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:139:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:139:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:145:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:145:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:169:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:169:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_ecc, correct_ecc, 3);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:182:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(error_data, correct_data, size);
^~~~~~
drivers/mtd/tests/mtd_nandecctest.c:182:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(error_data, correct_data, size);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/scsi/ufs/ufshcd-pltfrm.c:123:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prop_name, MAX_PROP_SIZE, "%s-supply", name);
^~~~~~~~
drivers/scsi/ufs/ufshcd-pltfrm.c:123:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(prop_name, MAX_PROP_SIZE, "%s-supply", name);
^~~~~~~~
drivers/scsi/ufs/ufshcd-pltfrm.c:138:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prop_name, MAX_PROP_SIZE, "%s-max-microamp", name);
^~~~~~~~
drivers/scsi/ufs/ufshcd-pltfrm.c:138:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(prop_name, MAX_PROP_SIZE, "%s-max-microamp", name);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> drivers/scsi/virtio_scsi.c:161:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sc->sense_buffer, resp->sense,
^~~~~~
drivers/scsi/virtio_scsi.c:161:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sc->sense_buffer, resp->sense,
^~~~~~
>> drivers/scsi/virtio_scsi.c:344:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(scsi_cmd, 0, sizeof(scsi_cmd));
^~~~~~
drivers/scsi/virtio_scsi.c:344:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(scsi_cmd, 0, sizeof(scsi_cmd));
^~~~~~
drivers/scsi/virtio_scsi.c:348:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(inq_result, 0, inq_result_len);
^~~~~~
drivers/scsi/virtio_scsi.c:348:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(inq_result, 0, inq_result_len);
^~~~~~
drivers/scsi/virtio_scsi.c:579:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmd->req.cmd_pi.cdb, sc->cmnd, sc->cmd_len);
^~~~~~
drivers/scsi/virtio_scsi.c:579:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmd->req.cmd_pi.cdb, sc->cmnd, sc->cmd_len);
^~~~~~
drivers/scsi/virtio_scsi.c:585:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmd->req.cmd.cdb, sc->cmnd, sc->cmd_len);
^~~~~~
drivers/scsi/virtio_scsi.c:585:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmd->req.cmd.cdb, sc->cmnd, sc->cmd_len);
^~~~~~
drivers/scsi/virtio_scsi.c:643:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/scsi/virtio_scsi.c:643:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/scsi/virtio_scsi.c:701:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/scsi/virtio_scsi.c:701:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(*cmd));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/w83l785ts.c:117:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/w83l785ts.c:117:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/hwmon/w83l786ng.c:232:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:232:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:233:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in_min)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:233:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in_min)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:234:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in_max)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:234:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in_max)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:287:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_fan_reg(fan);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:287:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_fan_reg(fan);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:288:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_fan_reg(fan_min);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
--
^
drivers/scsi/libsas/sas_expander.c:1839:6: note: Left side of '&&' is true
if (ex_change_count != -1 && ex_change_count != ex->ex_change_count) {
^
drivers/scsi/libsas/sas_expander.c:1839:31: note: Assuming 'ex_change_count' is equal to field 'ex_change_count'
if (ex_change_count != -1 && ex_change_count != ex->ex_change_count) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1839:2: note: Taking false branch
if (ex_change_count != -1 && ex_change_count != ex->ex_change_count) {
^
drivers/scsi/libsas/sas_expander.c:1855:2: note: Loop condition is true. Entering loop body
list_for_each_entry(ch, &ex->children, siblings) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/scsi/libsas/sas_expander.c:1856:3: note: Taking true branch
if (dev_is_expander(ch->dev_type)) {
^
drivers/scsi/libsas/sas_expander.c:1857:10: note: Calling 'sas_find_bcast_dev'
res = sas_find_bcast_dev(ch, src_dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1836:8: note: Calling 'sas_get_ex_change_count'
res = sas_get_ex_change_count(dev, &ex_change_count);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1786:6: note: Assuming 'rg_req' is non-null
if (!rg_req)
^~~~~~~
drivers/scsi/libsas/sas_expander.c:1786:2: note: Taking false branch
if (!rg_req)
^
drivers/scsi/libsas/sas_expander.c:1789:12: note: Calling 'alloc_smp_resp'
rg_resp = alloc_smp_resp(RG_RESP_SIZE);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:166:9: note: Calling 'kzalloc'
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Uninitialized value stored to field 'result'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:2: note: Returning pointer, which participates in a condition later
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:166:9: note: Returning from 'kzalloc'
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:166:2: note: Returning pointer, which participates in a condition later
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1789:12: note: Returning from 'alloc_smp_resp'
rg_resp = alloc_smp_resp(RG_RESP_SIZE);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1790:6: note: Assuming 'rg_resp' is non-null
if (!rg_resp) {
^~~~~~~~
drivers/scsi/libsas/sas_expander.c:1790:2: note: Taking false branch
if (!rg_resp) {
^
drivers/scsi/libsas/sas_expander.c:1797:8: note: Calling 'smp_execute_task'
res = smp_execute_task(dev, rg_req, RG_REQ_SIZE, rg_resp,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:151:2: note: Returning without writing to 'resp->result'
return smp_execute_task_sg(dev, &req_sg, &resp_sg);
^
drivers/scsi/libsas/sas_expander.c:151:2: note: Returning value, which participates in a condition later
return smp_execute_task_sg(dev, &req_sg, &resp_sg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1797:8: note: Returning from 'smp_execute_task'
res = smp_execute_task(dev, rg_req, RG_REQ_SIZE, rg_resp,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1799:6: note: Assuming 'res' is 0
if (res)
^~~
drivers/scsi/libsas/sas_expander.c:1799:2: note: Taking false branch
if (res)
^
drivers/scsi/libsas/sas_expander.c:1801:22: note: The left operand of '!=' is a garbage value
if (rg_resp->result != SMP_RESP_FUNC_ACC) {
~~~~~~~~~~~~~~~ ^
drivers/scsi/libsas/sas_expander.c:1903:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(phy->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_expander.c:1903:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(phy->attached_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_expander.c:2009:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(msg, ", part of a wide port with phy%02d", sibling);
^~~~~~~
drivers/scsi/libsas/sas_expander.c:2009:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(msg, ", part of a wide port with phy%02d", sibling);
^~~~~~~
drivers/scsi/libsas/sas_expander.c:2014:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_expander.c:2014:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/mtd/devices/block2mtd.c:74:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_address(page), 0xff, PAGE_SIZE);
^~~~~~
drivers/mtd/devices/block2mtd.c:74:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_address(page), 0xff, PAGE_SIZE);
^~~~~~
>> drivers/mtd/devices/block2mtd.c:124:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, page_address(page) + offset, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:124:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, page_address(page) + offset, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:160:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page) + offset, buf, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:160:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page) + offset, buf, cpylen);
^~~~~~
drivers/mtd/devices/block2mtd.c:402:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(str, val);
^~~~~~
drivers/mtd/devices/block2mtd.c:402:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(str, val);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/mtd/nand/onenand/onenand_base.c:779:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, bufferram + offset, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:779:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, bufferram + offset, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:817:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, bufferram + offset, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:817:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, bufferram + offset, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:860:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufferram + offset, buffer, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:860:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bufferram + offset, buffer, count);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1730:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1730:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1731:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(this->page_buf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1731:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(this->page_buf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1836:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1836:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1837:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(this->page_buf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1837:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(this->page_buf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1848:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oobbuf, 0xff, mtd->oobsize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1848:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oobbuf, 0xff, mtd->oobsize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1852:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oobbuf + oobcolumn, oob, thisooblen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:1852:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(oobbuf + oobcolumn, oob, thisooblen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2019:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oobbuf, 0xff, mtd->oobsize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2019:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oobbuf, 0xff, mtd->oobsize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2023:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oobbuf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2023:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(oobbuf + column, buf, thislen);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2028:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
drivers/mtd/nand/onenand/onenand_base.c:2028:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(this->page_buf, 0xff, mtd->writesize);
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/max6650.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", alarm);
--
^~~~~~~~
drivers/vhost/scsi.c:2374:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(&tport->tport_name[0], VHOST_SCSI_NAMELEN, "%s", &name[off]);
^~~~~~~~
drivers/vhost/scsi.c:2397:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "TCM_VHOST fabric module %s on %s/%s"
^~~~~~~
drivers/vhost/scsi.c:2397:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "TCM_VHOST fabric module %s on %s/%s"
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
net/bluetooth/mgmt_util.c:193:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ev->data, rp, rp_len);
^~~~~~
net/bluetooth/mgmt_util.c:193:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ev->data, rp, rp_len);
^~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
net/bluetooth/hci_codec.c:31:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(entry->caps, caps, len);
^~~~~~
net/bluetooth/hci_codec.c:31:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(entry->caps, caps, len);
^~~~~~
net/bluetooth/hci_codec.c:157:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&caps, 0, sizeof(caps));
^~~~~~
net/bluetooth/hci_codec.c:157:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&caps, 0, sizeof(caps));
^~~~~~
net/bluetooth/hci_codec.c:223:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&caps, 0, sizeof(caps));
^~~~~~
net/bluetooth/hci_codec.c:223:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&caps, 0, sizeof(caps));
^~~~~~
Suppressed 71 warnings (71 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
80 warnings generated.
net/bluetooth/eir.c:43:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, hdev->dev_name, HCI_MAX_SHORT_NAME_LENGTH);
^~~~~~
net/bluetooth/eir.c:43:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, hdev->dev_name, HCI_MAX_SHORT_NAME_LENGTH);
^~~~~~
net/bluetooth/eir.c:125:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, &uuid->uuid[12], sizeof(u32));
^~~~~~
net/bluetooth/eir.c:125:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, &uuid->uuid[12], sizeof(u32));
^~~~~~
net/bluetooth/eir.c:158:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, uuid->uuid, 16);
^~~~~~
net/bluetooth/eir.c:158:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, uuid->uuid, 16);
^~~~~~
net/bluetooth/eir.c:185:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr + 2, hdev->dev_name, name_len);
^~~~~~
net/bluetooth/eir.c:185:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr + 2, hdev->dev_name, name_len);
^~~~~~
net/bluetooth/eir.c:212:2: warning: Value stored to 'ptr' is never read [clang-analyzer-deadcode.DeadStores]
ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bluetooth/eir.c:212:2: note: Value stored to 'ptr' is never read
ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/bluetooth/eir.c:271:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, adv->adv_data, adv->adv_data_len);
^~~~~~
net/bluetooth/eir.c:271:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, adv->adv_data, adv->adv_data_len);
^~~~~~
net/bluetooth/eir.c:295:4: warning: Value stored to 'ptr' is never read [clang-analyzer-deadcode.DeadStores]
ptr += 3;
^ ~
net/bluetooth/eir.c:295:4: note: Value stored to 'ptr' is never read
ptr += 3;
^ ~
net/bluetooth/eir.c:327:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ptr[scan_rsp_len], adv->scan_rsp_data, adv->scan_rsp_len);
^~~~~~
net/bluetooth/eir.c:327:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ptr[scan_rsp_len], adv->scan_rsp_data, adv->scan_rsp_len);
^~~~~~
Suppressed 72 warnings (72 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/video/fbdev/core/softcursor.c:70:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(src, image->data, dsize);
^~~~~~
drivers/video/fbdev/core/softcursor.c:70:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(src, image->data, dsize);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/video/fbdev/core/fbcon_rotate.c:62:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, ops->fd_size);
^~~~~~
drivers/video/fbdev/core/fbcon_rotate.c:62:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst, 0, ops->fd_size);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/video/fbdev/core/fbcon_cw.c:330:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mask, 0, w * vc->vc_font.width);
^~~~~~
drivers/video/fbdev/core/fbcon_cw.c:330:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mask, 0, w * vc->vc_font.width);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/hwmon/occ/common.c:192:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cmd[4], &user_power_cap_be, 2);
^~~~~~
drivers/hwmon/occ/common.c:192:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cmd[4], &user_power_cap_be, 2);
^~~~~~
>> drivers/hwmon/occ/common.c:873:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name), "temp%d_label", s);
^~~~~~~~
drivers/hwmon/occ/common.c:873:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name), "temp%d_label", s);
^~~~~~~~
drivers/hwmon/occ/common.c:880:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:880:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:883:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:883:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:892:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:892:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:898:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:898:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:905:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:905:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:918:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name), "freq%d_label", s);
^~~~~~~~
drivers/hwmon/occ/common.c:918:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name), "freq%d_label", s);
^~~~~~~~
drivers/hwmon/occ/common.c:923:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name), "freq%d_input", s);
^~~~~~~~
drivers/hwmon/occ/common.c:923:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name), "freq%d_input", s);
^~~~~~~~
drivers/hwmon/occ/common.c:941:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:941:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:948:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:948:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:955:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:955:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:962:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:962:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:978:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:978:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:984:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:984:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:990:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:990:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:996:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:996:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name),
^~~~~~~~
drivers/hwmon/occ/common.c:1007:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attr->name, sizeof(attr->name), "power%d_label", s);
^~~~~~~~
drivers/hwmon/occ/common.c:1007:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attr->name, sizeof(attr->name), "power%d_label", s);
--
70 warnings generated.
net/nfc/core.c:850:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->targets[i], &dev->targets[i + 1],
^~~~~~
net/nfc/core.c:850:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->targets[i], &dev->targets[i + 1],
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/nfc/netlink.c:1647:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->cb, 0, sizeof(skb->cb));
^~~~~~
net/nfc/netlink.c:1647:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->cb, 0, sizeof(skb->cb));
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
net/nfc/llcp_core.c:570:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gb_cur, llcp_magic, ARRAY_SIZE(llcp_magic));
^~~~~~
net/nfc/llcp_core.c:570:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gb_cur, llcp_magic, ARRAY_SIZE(llcp_magic));
^~~~~~
net/nfc/llcp_core.c:573:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gb_cur, version_tlv, version_length);
^~~~~~
net/nfc/llcp_core.c:573:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gb_cur, version_tlv, version_length);
^~~~~~
net/nfc/llcp_core.c:576:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gb_cur, lto_tlv, lto_length);
^~~~~~
net/nfc/llcp_core.c:576:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gb_cur, lto_tlv, lto_length);
^~~~~~
net/nfc/llcp_core.c:579:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gb_cur, wks_tlv, wks_length);
^~~~~~
net/nfc/llcp_core.c:579:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gb_cur, wks_tlv, wks_length);
^~~~~~
net/nfc/llcp_core.c:582:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gb_cur, miux_tlv, miux_length);
^~~~~~
net/nfc/llcp_core.c:582:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gb_cur, miux_tlv, miux_length);
^~~~~~
net/nfc/llcp_core.c:583:2: warning: Value stored to 'gb_cur' is never read [clang-analyzer-deadcode.DeadStores]
gb_cur += miux_length;
^ ~~~~~~~~~~~
net/nfc/llcp_core.c:583:2: note: Value stored to 'gb_cur' is never read
gb_cur += miux_length;
^ ~~~~~~~~~~~
net/nfc/llcp_core.c:626:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(local->remote_gb, 0, NFC_MAX_GT_LEN);
^~~~~~
net/nfc/llcp_core.c:626:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(local->remote_gb, 0, NFC_MAX_GT_LEN);
^~~~~~
net/nfc/llcp_core.c:627:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(local->remote_gb, gb, gb_len);
^~~~~~
net/nfc/llcp_core.c:627:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(local->remote_gb, gb, gb_len);
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/hwmon/powr1220.c:181:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", adc_val);
^~~~~~~
drivers/hwmon/powr1220.c:181:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", adc_val);
^~~~~~~
drivers/hwmon/powr1220.c:191:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->adc_maxes[attr->index]);
^~~~~~~
drivers/hwmon/powr1220.c:191:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->adc_maxes[attr->index]);
^~~~~~~
drivers/hwmon/powr1220.c:201:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
drivers/hwmon/powr1220.c:201:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
>> net/rfkill/input.c:104:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rfkill_sw_pending, 0,
^~~~~~
net/rfkill/input.c:104:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rfkill_sw_pending, 0,
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
net/9p/client.c:625:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = p9pdu_readf(&req->rc, c->proto_version, "d", &ecode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/9p/client.c:625:3: note: Value stored to 'err' is never read
err = p9pdu_readf(&req->rc, c->proto_version, "d", &ecode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/9p/client.c:896:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fid->qid, 0, sizeof(fid->qid));
^~~~~~
net/9p/client.c:896:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fid->qid, 0, sizeof(fid->qid));
^~~~~~
net/9p/client.c:1004:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
net/9p/client.c:1004:2: note: Value stored to 'err' is never read
err = 0;
^ ~
net/9p/client.c:1014:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(clnt->name, client_id, strlen(client_id) + 1);
^~~~~~
net/9p/client.c:1014:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(clnt->name, client_id, strlen(client_id) + 1);
^~~~~~
net/9p/client.c:1154:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1154:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1176:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
net/9p/client.c:1176:2: note: Value stored to 'err' is never read
err = 0;
^ ~
net/9p/client.c:1222:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&fid->qid, &wqids[nwqids - 1], sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1222:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&fid->qid, &wqids[nwqids - 1], sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1224:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&fid->qid, &oldfid->qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1224:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&fid->qid, &oldfid->qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1253:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
net/9p/client.c:1253:2: note: Value stored to 'err' is never read
err = 0;
^ ~
net/9p/client.c:1277:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1277:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1321:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ofid->qid, qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1321:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ofid->qid, qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1343:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
net/9p/client.c:1343:2: note: Value stored to 'err' is never read
err = 0;
^ ~
net/9p/client.c:1365:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1365:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&fid->qid, &qid, sizeof(struct p9_qid));
^~~~~~~
net/9p/client.c:1711:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
net/9p/client.c:1711:2: note: Value stored to 'err' is never read
err = 0;
^ ~
net/9p/client.c:1764:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
--
drivers/vfio/vfio_iommu_type1.c:2009:7: note: Left side of '&&' is true
drivers/vfio/vfio_iommu_type1.c:2009:31: note: Assuming 'start' is >= field 'end'
if (start >= node->start && start < node->end) {
^~~~~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2009:3: note: Taking false branch
if (start >= node->start && start < node->end) {
^
drivers/vfio/vfio_iommu_type1.c:2015:3: note: Memory is released
kfree(node);
^~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2006:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(node, next, iova, list) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/vfio/vfio_iommu_type1.c:2007:7: note: Assuming 'start' is < field 'start'
if (start < node->start)
^~~~~~~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2007:3: note: Taking true branch
if (start < node->start)
^
drivers/vfio/vfio_iommu_type1.c:2008:4: note: Execution continues on line 2019
break;
^
drivers/vfio/vfio_iommu_type1.c:2019:2: note: Use of memory after it is freed
list_for_each_entry_safe(node, next, iova, list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/vfio/vfio_iommu_type1.c:2392:40: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
struct iommu_domain_geometry *geo = &domain->domain->geometry;
^
drivers/vfio/vfio_iommu_type1.c:2464:2: note: Loop condition is false. Execution continues on line 2484
list_for_each_entry(group, &iommu->emulated_iommu_groups, next) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/vfio/vfio_iommu_type1.c:2486:2: note: Loop condition is true. Entering loop body
list_for_each_entry(domain, &iommu->domain_list, next) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/vfio/vfio_iommu_type1.c:2488:7: note: Assuming 'group' is non-null
if (!group)
^~~~~~
drivers/vfio/vfio_iommu_type1.c:2488:3: note: Taking false branch
if (!group)
^
drivers/vfio/vfio_iommu_type1.c:2492:24: note: Assuming field 'pinned_page_dirty_scope' is true
update_dirty_scope = !group->pinned_page_dirty_scope;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2502:7: note: Assuming the condition is true
if (list_empty(&domain->group_list)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2502:3: note: Taking true branch
if (list_empty(&domain->group_list)) {
^
drivers/vfio/vfio_iommu_type1.c:2503:4: note: Taking false branch
if (list_is_singular(&iommu->domain_list)) {
^
drivers/vfio/vfio_iommu_type1.c:2513:4: note: Memory is released
kfree(domain);
^~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2514:4: note: Calling 'vfio_iommu_aper_expand'
vfio_iommu_aper_expand(iommu, &iova_copy);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2388:2: note: Taking false branch
if (list_empty(iova_copy))
^
drivers/vfio/vfio_iommu_type1.c:2391:2: note: Loop condition is true. Entering loop body
list_for_each_entry(domain, &iommu->domain_list, next) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/vfio/vfio_iommu_type1.c:2392:40: note: Use of memory after it is freed
struct iommu_domain_geometry *geo = &domain->domain->geometry;
^~~~~~~~~~~~~~
drivers/vfio/vfio_iommu_type1.c:2666:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iova_cap->iova_ranges, cap_iovas->iova_ranges,
^~~~~~
drivers/vfio/vfio_iommu_type1.c:2666:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iova_cap->iova_ranges, cap_iovas->iova_ranges,
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
>> drivers/hwmon/s3c-hwmon.c:95:28: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return (ret < 0) ? ret : snprintf(buf, PAGE_SIZE, "%d\n", ret);
^~~~~~~~
drivers/hwmon/s3c-hwmon.c:95:28: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return (ret < 0) ? ret : snprintf(buf, PAGE_SIZE, "%d\n", ret);
^~~~~~~~
drivers/hwmon/s3c-hwmon.c:215:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attrs->in_name, sizeof(attrs->in_name), "in%d_input", channel);
^~~~~~~~
drivers/hwmon/s3c-hwmon.c:215:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attrs->in_name, sizeof(attrs->in_name), "in%d_input", channel);
^~~~~~~~
drivers/hwmon/s3c-hwmon.c:232:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(attrs->label_name, sizeof(attrs->label_name),
^~~~~~~~
drivers/hwmon/s3c-hwmon.c:232:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(attrs->label_name, sizeof(attrs->label_name),
^~~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
fs/ext4/resize.c:383:3: warning: Value stored to 'group' is never read [clang-analyzer-deadcode.DeadStores]
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:383:3: note: Value stored to 'group' is never read
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:449:7: warning: Value stored to 'count2' is never read [clang-analyzer-deadcode.DeadStores]
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:449:7: note: Value stored to 'count2' is never read
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:580:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:580:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:903:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:903:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:914:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n_group_desc, o_group_desc,
^~~~~~
fs/ext4/resize.c:914:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n_group_desc, o_group_desc,
^~~~~~
fs/ext4/resize.c:968:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n_group_desc, o_group_desc,
^~~~~~
fs/ext4/resize.c:968:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n_group_desc, o_group_desc,
^~~~~~
fs/ext4/resize.c:1003:27: warning: Access to field 'i_sb' results in a dereference of a null pointer (loaded from variable 'inode') [clang-analyzer-core.NullDereference]
struct super_block *sb = inode->i_sb;
^
fs/ext4/resize.c:1659:21: note: Assuming the condition is false
int reserved_gdb = ext4_bg_has_super(sb, input->group) ?
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:1659:21: note: '?' condition is false
fs/ext4/resize.c:1661:2: note: 'inode' initialized to a null pointer value
struct inode *inode = NULL;
^~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:1668:6: note: Assuming 'gdb_off' is not equal to 0
if (gdb_off == 0 && !ext4_has_feature_sparse_super(sb)) {
^~~~~~~~~~~~
fs/ext4/resize.c:1668:19: note: Left side of '&&' is false
if (gdb_off == 0 && !ext4_has_feature_sparse_super(sb)) {
^
fs/ext4/resize.c:1673:6: note: Assuming the condition is false
if (ext4_blocks_count(es) + input->blocks_count <
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:1673:2: note: Taking false branch
if (ext4_blocks_count(es) + input->blocks_count <
^
fs/ext4/resize.c:1679:6: note: Assuming the condition is false
if (le32_to_cpu(es->s_inodes_count) + EXT4_INODES_PER_GROUP(sb) <
^
include/linux/byteorder/generic.h:89:21: note: expanded from macro 'le32_to_cpu'
#define le32_to_cpu __le32_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:35:26: note: expanded from macro '__le32_to_cpu'
#define __le32_to_cpu(x) ((__force __u32)(__le32)(x))
^
fs/ext4/resize.c:1679:2: note: Taking false branch
--
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
fs/nilfs2/cpfile.c:460:3: note: Loop condition is false. Exiting loop
kunmap_atomic(kaddr);
^
include/linux/highmem-internal.h:243:35: note: expanded from macro 'kunmap_atomic'
#define kunmap_atomic(__addr) \
^
fs/nilfs2/cpfile.c:440:2: note: Loop condition is false. Execution continues on line 464
for (n = 0; n < nci; cno += ncps) {
^
fs/nilfs2/cpfile.c:465:6: note: 'n' is > 0
if (n > 0) {
^
fs/nilfs2/cpfile.c:465:2: note: Taking true branch
if (n > 0) {
^
fs/nilfs2/cpfile.c:467:22: note: The left operand of '+' is a garbage value
*cnop = ci->ci_cno + 1;
~~~~~~~~~~ ^
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
56 warnings generated.
84 warnings generated.
112 warnings generated.
140 warnings generated.
168 warnings generated.
196 warnings generated.
224 warnings generated.
drivers/mtd/tests/mtd_test.c:16:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/tests/mtd_test.c:16:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
Suppressed 216 warnings (216 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/mtd/tests/readtest.c:43:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0 , pgsize);
^~~~~~
drivers/mtd/tests/readtest.c:43:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0 , pgsize);
^~~~~~
drivers/mtd/tests/readtest.c:90:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%05x: ", i);
^~~~~~~
drivers/mtd/tests/readtest.c:90:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%05x: ", i);
^~~~~~~
drivers/mtd/tests/readtest.c:92:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%02x", (unsigned int)iobuf[i]);
^~~~~~~
drivers/mtd/tests/readtest.c:92:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%02x", (unsigned int)iobuf[i]);
^~~~~~~
drivers/mtd/tests/readtest.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%05x: ", i);
^~~~~~~
drivers/mtd/tests/readtest.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%05x: ", i);
^~~~~~~
drivers/mtd/tests/readtest.c:106:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%02x",
^~~~~~~
drivers/mtd/tests/readtest.c:106:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%02x",
^~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/media/cec/core/cec-notifier.c:118:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&n->conn_info, 0, sizeof(n->conn_info));
^~~~~~
drivers/media/cec/core/cec-notifier.c:118:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&n->conn_info, 0, sizeof(n->conn_info));
^~~~~~
drivers/media/cec/core/cec-notifier.c:135:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&n->conn_info, 0, sizeof(n->conn_info));
^~~~~~
drivers/media/cec/core/cec-notifier.c:135:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&n->conn_info, 0, sizeof(n->conn_info));
^~~~~~
Suppressed 55 warnings (55 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> drivers/media/cec/core/cec-pin.c:331:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pin->rx_msg.msg, 0, sizeof(pin->rx_msg.msg));
^~~~~~
drivers/media/cec/core/cec-pin.c:331:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pin->rx_msg.msg, 0, sizeof(pin->rx_msg.msg));
^~~~~~
drivers/media/cec/core/cec-pin.c:583:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pin->rx_msg.msg, 0, sizeof(pin->rx_msg.msg));
^~~~~~
drivers/media/cec/core/cec-pin.c:583:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pin->rx_msg.msg, 0, sizeof(pin->rx_msg.msg));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
Suppressed 55 warnings (55 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/hwmon/adm1029.c:164:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/adm1029.c:164:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/adm1029.c:177:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0\n");
^~~~~~~
drivers/hwmon/adm1029.c:177:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0\n");
^~~~~~~
drivers/hwmon/adm1029.c:182:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/adm1029.c:182:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/adm1029.c:192:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0\n");
^~~~~~~
drivers/hwmon/adm1029.c:192:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0\n");
^~~~~~~
drivers/hwmon/adm1029.c:193:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", DIV_FROM_REG(data->fan_div[attr->index]));
^~~~~~~
drivers/hwmon/adm1029.c:193:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", DIV_FROM_REG(data->fan_div[attr->index]));
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/media/tuners/xc5000.c:645:2: warning: 3rd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
dprintk(1, "*** ADC envelope (0-1023) = %d\n", adc_envelope);
^
drivers/media/tuners/xc5000.c:37:2: note: expanded from macro 'dprintk'
printk(KERN_INFO "%s: " fmt, "xc5000", ## arg)
^
include/linux/printk.h:446:44: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
drivers/media/tuners/xc5000.c:1286:2: note: Assuming 'debug' is < 1
dprintk(1, "%s()\n", __func__);
^
drivers/media/tuners/xc5000.c:36:41: note: expanded from macro 'dprintk'
#define dprintk(level, fmt, arg...) if (debug >= level) \
^~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:1286:2: note: Taking false branch
dprintk(1, "%s()\n", __func__);
^
drivers/media/tuners/xc5000.c:36:37: note: expanded from macro 'dprintk'
#define dprintk(level, fmt, arg...) if (debug >= level) \
^
drivers/media/tuners/xc5000.c:1288:2: note: Taking false branch
if (xc_load_fw_and_init_tuner(fe, 0) != 0) {
^
drivers/media/tuners/xc5000.c:1293:6: note: Assuming 'debug' is not equal to 0
if (debug)
^~~~~
drivers/media/tuners/xc5000.c:1293:2: note: Taking true branch
if (debug)
^
drivers/media/tuners/xc5000.c:1294:3: note: Calling 'xc_debug_dump'
xc_debug_dump(priv);
^~~~~~~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:625:2: note: 'adc_envelope' declared without an initial value
u16 adc_envelope;
^~~~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:644:2: note: Calling 'xc_get_adc_envelope'
xc_get_adc_envelope(priv, &adc_envelope);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:478:9: note: Calling 'xc5000_readreg'
return xc5000_readreg(priv, XREG_ADC_ENV, adc_envelope);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:284:6: note: Assuming the condition is true
if (i2c_transfer(priv->i2c_props.adap, msg, 2) != 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/tuners/xc5000.c:284:2: note: Taking true branch
if (i2c_transfer(priv->i2c_props.adap, msg, 2) != 2) {
^
drivers/media/tuners/xc5000.c:285:3: note: Loop condition is false. Exiting loop
printk(KERN_WARNING "xc5000: I2C read failed\n");
--
^
net/batman-adv/tvlv.c:197:2: note: Calling 'batadv_tvlv_container_put'
batadv_tvlv_container_put(tvlv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:112:7: note: 'tvlv' is non-null
if (!tvlv)
^~~~
net/batman-adv/tvlv.c:112:2: note: Taking false branch
if (!tvlv)
^
net/batman-adv/tvlv.c:115:2: note: Calling 'kref_put'
kref_put(&tvlv->refcount, batadv_tvlv_container_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:2: note: Taking true branch
if (refcount_dec_and_test(&kref->refcount)) {
^
include/linux/kref.h:65:3: note: Calling 'batadv_tvlv_container_release'
release(kref);
^~~~~~~~~~~~~
net/batman-adv/tvlv.c:102:2: note: Memory is released
kfree(tvlv);
^~~~~~~~~~~
include/linux/kref.h:65:3: note: Returning; memory was released
release(kref);
^~~~~~~~~~~~~
net/batman-adv/tvlv.c:115:2: note: Returning; memory was released
kref_put(&tvlv->refcount, batadv_tvlv_container_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:197:2: note: Returning; memory was released via 1st parameter
batadv_tvlv_container_put(tvlv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:198:2: note: Use of memory after it is freed
batadv_tvlv_container_put(tvlv);
^ ~~~~
net/batman-adv/tvlv.c:248:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:248:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:248:2: warning: Null pointer passed as 2nd argument to memory copy function [clang-analyzer-unix.cstring.NullArg]
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^ ~~~~~~~~~~
net/batman-adv/tvlv.c:237:6: note: Assuming 'tvlv_value' is null
if (!tvlv_value)
^~~~~~~~~~~
net/batman-adv/tvlv.c:237:2: note: Taking true branch
if (!tvlv_value)
^
net/batman-adv/tvlv.c:240:13: note: Calling 'kzalloc'
tvlv_new = kzalloc(sizeof(*tvlv_new) + tvlv_value_len, GFP_ATOMIC);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Calling 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:569:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:586:2: note: Returning pointer, which participates in a condition later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:9: note: Returning from 'kmalloc'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:715:2: note: Returning pointer, which participates in a condition later
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:240:13: note: Returning from 'kzalloc'
tvlv_new = kzalloc(sizeof(*tvlv_new) + tvlv_value_len, GFP_ATOMIC);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:241:6: note: Assuming 'tvlv_new' is non-null
if (!tvlv_new)
^~~~~~~~~
net/batman-adv/tvlv.c:241:2: note: Taking false branch
if (!tvlv_new)
^
net/batman-adv/tvlv.c:248:2: note: Null pointer passed as 2nd argument to memory copy function
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^ ~~~~~~~~~~
net/batman-adv/tvlv.c:289:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_buff, *packet_buff, min_packet_len);
^~~~~~
net/batman-adv/tvlv.c:289:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_buff, *packet_buff, min_packet_len);
^~~~~~
net/batman-adv/tvlv.c:341:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:341:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:631:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
^~~~~~
net/batman-adv/tvlv.c:631:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
^~~~~~
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/md/dm-ps-service-time.c:138:15: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (argc && (sscanf(argv[0], "%u%c", &repeat_count, &dummy) != 1)) {
^~~~~~
drivers/md/dm-ps-service-time.c:138:15: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (argc && (sscanf(argv[0], "%u%c", &repeat_count, &dummy) != 1)) {
^~~~~~
drivers/md/dm-ps-service-time.c:149:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
(sscanf(argv[1], "%u%c", &relative_throughput, &dummy) != 1 ||
^~~~~~
drivers/md/dm-ps-service-time.c:149:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
(sscanf(argv[1], "%u%c", &relative_throughput, &dummy) != 1 ||
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/md/dm-snap.c:1323:2: warning: Value stored to 'argv' is never read [clang-analyzer-deadcode.DeadStores]
argv += args_used;
^ ~~~~~~~~~
drivers/md/dm-snap.c:1323:2: note: Value stored to 'argv' is never read
argv += args_used;
^ ~~~~~~~~~
drivers/md/dm-snap.c:1324:2: warning: Value stored to 'argc' is never read [clang-analyzer-deadcode.DeadStores]
argc -= args_used;
^ ~~~~~~~~~
drivers/md/dm-snap.c:1324:2: note: Value stored to 'argc' is never read
argc -= args_used;
^ ~~~~~~~~~
drivers/md/dm-snap.c:2745:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(result, maxlen, "%s", o->dev->name);
^~~~~~~~
drivers/md/dm-snap.c:2745:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(result, maxlen, "%s", o->dev->name);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
net/9p/trans_fd.c:351:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m->rc.sdata, m->tmp_buf, m->rc.capacity);
^~~~~~
net/9p/trans_fd.c:351:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m->rc.sdata, m->tmp_buf, m->rc.capacity);
^~~~~~
net/9p/trans_fd.c:936:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rc = sscanf(buf, "%d.%d.%d.%d", &in[0], &in[1], &in[2], &in[3]);
^~~~~~
net/9p/trans_fd.c:936:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
rc = sscanf(buf, "%d.%d.%d.%d", &in[0], &in[1], &in[2], &in[3]);
^~~~~~
net/9p/trans_fd.c:951:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cl, 0, sizeof(cl));
^~~~~~
net/9p/trans_fd.c:951:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cl, 0, sizeof(cl));
^~~~~~
net/9p/trans_fd.c:1036:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(sun_server.sun_path, addr);
^~~~~~
net/9p/trans_fd.c:1036:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(sun_server.sun_path, addr);
^~~~~~
Suppressed 72 warnings (71 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
net/9p/trans_virtio.c:416:33: warning: The right operand of '+' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
out_nr_pages = DIV_ROUND_UP(n + offs, PAGE_SIZE);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:40: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
net/9p/trans_virtio.c:402:2: note: 'offs' declared without an initial value
size_t offs;
^~~~~~~~~~~
net/9p/trans_virtio.c:406:2: note: Taking false branch
p9_debug(P9_DEBUG_TRANS, "virtio request\n");
^
include/net/9p/9p.h:56:2: note: expanded from macro 'p9_debug'
no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
net/9p/trans_virtio.c:408:6: note: Assuming 'uodata' is non-null
if (uodata) {
^~~~~~
net/9p/trans_virtio.c:408:2: note: Taking true branch
if (uodata) {
^
net/9p/trans_virtio.c:410:11: note: Calling 'p9_get_mapped_pages'
int n = p9_get_mapped_pages(chan, &out_pages, uodata,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/9p/trans_virtio.c:319:6: note: Assuming the condition is true
if (!iov_iter_count(data))
--
ret = snprintf(
^~~~~~~~
drivers/md/raid5-cache.c:2555:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(
^~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/md/raid5-ppl.c:245:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(io, 0, sizeof(*io));
^~~~~~
drivers/md/raid5-ppl.c:245:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(io, 0, sizeof(*io));
^~~~~~
drivers/md/raid5-ppl.c:256:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
clear_page(pplhdr);
^
arch/arm/include/asm/page.h:139:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((void *)(page), 0, PAGE_SIZE)
^~~~~~
drivers/md/raid5-ppl.c:256:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
clear_page(pplhdr);
^
arch/arm/include/asm/page.h:139:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((void *)(page), 0, PAGE_SIZE)
^~~~~~
drivers/md/raid5-ppl.c:257:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pplhdr->reserved, 0xff, PPL_HDR_RESERVED);
^~~~~~
drivers/md/raid5-ppl.c:257:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pplhdr->reserved, 0xff, PPL_HDR_RESERVED);
^~~~~~
drivers/md/raid5-ppl.c:863:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_address(page1), 0, PAGE_SIZE);
^~~~~~
drivers/md/raid5-ppl.c:863:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_address(page1), 0, PAGE_SIZE);
^~~~~~
drivers/md/raid5-ppl.c:1064:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pplhdr->reserved, 0xff, PPL_HDR_RESERVED);
^~~~~~
drivers/md/raid5-ppl.c:1064:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pplhdr->reserved, 0xff, PPL_HDR_RESERVED);
^~~~~~
drivers/md/raid5-ppl.c:1513:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d\n", ppl_conf ? ppl_conf->write_hint : 0);
^~~~~~~
drivers/md/raid5-ppl.c:1513:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d\n", ppl_conf ? ppl_conf->write_hint : 0);
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/regulator/as3722-regulator.c:46:8: warning: Excessive padding in 'struct as3722_register_mapping' (14 padding bytes, where 2 is optimal).
Optimal fields order:
name,
sname,
n_voltages,
enable_reg,
control_reg,
sleep_ctrl_reg,
regulator_id,
vsel_reg,
vsel_mask,
enable_mask,
mode_mask,
sleep_ctrl_mask,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct as3722_register_mapping {
~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/as3722-regulator.c:46:8: note: Excessive padding in 'struct as3722_register_mapping' (14 padding bytes, where 2 is optimal). Optimal fields order: name, sname, n_voltages, enable_reg, control_reg, sleep_ctrl_reg, regulator_id, vsel_reg, vsel_mask, enable_mask, mode_mask, sleep_ctrl_mask, consider reordering the fields or adding explicit padding members
struct as3722_register_mapping {
~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
net/batman-adv/bat_iv_ogm.c:575:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_buff, packet_buff, packet_len);
^~~~~~
net/batman-adv/bat_iv_ogm.c:575:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_buff, packet_buff, packet_len);
^~~~~~
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
>> net/batman-adv/bat_v_elp.c:128:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link_settings, 0, sizeof(link_settings));
^~~~~~
net/batman-adv/bat_v_elp.c:128:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link_settings, 0, sizeof(link_settings));
^~~~~~
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/fpga/fpga-bridge.c:289:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", bridge->name);
^~~~~~~
drivers/fpga/fpga-bridge.c:289:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", bridge->name);
^~~~~~~
drivers/fpga/fpga-bridge.c:301:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", enable ? "enabled" : "disabled");
^~~~~~~
drivers/fpga/fpga-bridge.c:301:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", enable ? "enabled" : "disabled");
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
drivers/fpga/fpga-region.c:169:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%016llx%016llx\n",
^~~~~~~
drivers/fpga/fpga-region.c:169:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%016llx%016llx\n",
^~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
103 warnings generated.
Suppressed 103 warnings (97 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
Suppressed 98 warnings (97 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
Suppressed 81 warnings (80 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/leds/flash/leds-lm3601x.c:226:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_update_bits(led->regmap, LM3601X_CFG_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/flash/leds-lm3601x.c:226:3: note: Value stored to 'ret' is never read
ret = regmap_update_bits(led->regmap, LM3601X_CFG_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/flash/leds-lm3601x.c:230:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_update_bits(led->regmap, LM3601X_ENABLE_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/flash/leds-lm3601x.c:230:3: note: Value stored to 'ret' is never read
ret = regmap_update_bits(led->regmap, LM3601X_ENABLE_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/flash/leds-lm3601x.c:234:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = regmap_update_bits(led->regmap, LM3601X_ENABLE_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/flash/leds-lm3601x.c:234:3: note: Value stored to 'ret' is never read
ret = regmap_update_bits(led->regmap, LM3601X_ENABLE_REG,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/leds/leds-mlxreg.c:232:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_data->led_cdev_name, sizeof(led_data->led_cdev_name),
^~~~~~~~
drivers/leds/leds-mlxreg.c:232:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(led_data->led_cdev_name, sizeof(led_data->led_cdev_name),
^~~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/inode.c:407:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mapping, 0, sizeof(*mapping));
^~~~~~
fs/inode.c:407:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mapping, 0, sizeof(*mapping));
^~~~~~
fs/inode.c:419:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(inode, 0, sizeof(*inode));
^~~~~~
fs/inode.c:419:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(inode, 0, sizeof(*inode));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/staging/greybus/gbphy.c:34:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%02x\n", gbphy_dev->cport_desc->protocol_id);
^~~~~~~
drivers/staging/greybus/gbphy.c:34:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%02x\n", gbphy_dev->cport_desc->protocol_id);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/staging/greybus/uart.c:273:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = kfifo_out(&gb_tty->write_fifo, &request->data[0],
^
drivers/staging/greybus/uart.c:273:3: note: Value stored to 'ret' is never read
drivers/staging/greybus/uart.c:520:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&gb_tty->line_coding, &newline, sizeof(newline));
^~~~~~
drivers/staging/greybus/uart.c:520:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&gb_tty->line_coding, &newline, sizeof(newline));
^~~~~~
drivers/staging/greybus/uart.c:571:3: warning: Value stored to 'retval' is never read [clang-analyzer-deadcode.DeadStores]
retval = send_control(gb_tty, gb_tty->ctrlout);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/greybus/uart.c:571:3: note: Value stored to 'retval' is never read
retval = send_control(gb_tty, gb_tty->ctrlout);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/greybus/uart.c:590:3: warning: Value stored to 'retval' is never read [clang-analyzer-deadcode.DeadStores]
retval = send_control(gb_tty, gb_tty->ctrlout);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/greybus/uart.c:590:3: note: Value stored to 'retval' is never read
retval = send_control(gb_tty, gb_tty->ctrlout);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/video/fbdev/core/fbcon_ccw.c:347:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mask, 0, w * vc->vc_font.width);
^~~~~~
drivers/video/fbdev/core/fbcon_ccw.c:347:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mask, 0, w * vc->vc_font.width);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/mtd/nand/raw/gpio.c:250:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plat, dev_get_platdata(dev), sizeof(*plat));
^~~~~~
drivers/mtd/nand/raw/gpio.c:250:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plat, dev_get_platdata(dev), sizeof(*plat));
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/scsi/libsas/sas_scsi_host.c:87:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sc->sense_buffer, ts->buf,
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:87:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sc->sense_buffer, ts->buf,
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(task->ssp_task.LUN, &lun.scsi_lun, 8);
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(task->ssp_task.LUN, &lun.scsi_lun, 8);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/scsi/libsas/sas_task.c:27:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tstat->buf, iu->sense_data, tstat->buf_valid_size);
^~~~~~
drivers/scsi/libsas/sas_task.c:27:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tstat->buf, iu->sense_data, tstat->buf_valid_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/input/serio/arc_ps2.c:166:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(io->name, sizeof(io->name), "ARC PS/2 port%d", index);
^~~~~~~~
drivers/input/serio/arc_ps2.c:166:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(io->name, sizeof(io->name), "ARC PS/2 port%d", index);
^~~~~~~~
drivers/input/serio/arc_ps2.c:167:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(io->phys, sizeof(io->phys), "arc/serio%d", index);
^~~~~~~~
drivers/input/serio/arc_ps2.c:167:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(io->phys, sizeof(io->phys), "arc/serio%d", index);
^~~~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/serio/userio.c:145:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &userio->buf[userio->tail], copylen);
^~~~~~
drivers/input/serio/userio.c:145:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &userio->buf[userio->tail], copylen);
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/hwmon/pmbus/max20730.c:726:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data->info, &max20730_info[chip_id], sizeof(data->info));
^~~~~~
drivers/hwmon/pmbus/max20730.c:726:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data->info, &max20730_info[chip_id], sizeof(data->info));
^~~~~~
drivers/hwmon/pmbus/max20730.c:730:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data->vout_voltage_divider, 0, sizeof(data->vout_voltage_divider));
^~~~~~
drivers/hwmon/pmbus/max20730.c:730:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data->vout_voltage_divider, 0, sizeof(data->vout_voltage_divider));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/pmbus/mp2975.c:694:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data->info, &mp2975_info, sizeof(*info));
^~~~~~
drivers/hwmon/pmbus/mp2975.c:694:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data->info, &mp2975_info, sizeof(*info));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
>> drivers/media/cec/platform/cros-ec/cros-ec-cec.c:48:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cros_ec_cec->rx_msg.msg, cec_message, len);
^~~~~~
drivers/media/cec/platform/cros-ec/cros-ec-cec.c:48:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cros_ec_cec->rx_msg.msg, cec_message, len);
^~~~~~
drivers/media/cec/platform/cros-ec/cros-ec-cec.c:130:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.data.msg, cec_msg->msg, cec_msg->len);
^~~~~~
drivers/media/cec/platform/cros-ec/cros-ec-cec.c:130:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg.data.msg, cec_msg->msg, cec_msg->len);
^~~~~~
Suppressed 53 warnings (46 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
drivers/w1/masters/ds1wm.c:567:2: warning: Value stored to 'inten' is never read [clang-analyzer-deadcode.DeadStores]
inten = ds1wm_read_register(ds1wm_data, DS1WM_INT_EN);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/w1/masters/ds1wm.c:567:2: note: Value stored to 'inten' is never read
inten = ds1wm_read_register(ds1wm_data, DS1WM_INT_EN);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 11 warnings (10 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
net/hsr/hsr_forward.c:143:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, copylen);
^~~~~~
net/hsr/hsr_forward.c:143:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, copylen);
^~~~~~
net/hsr/hsr_forward.c:314:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dst, src, movelen);
^~~~~~~
net/hsr/hsr_forward.c:314:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dst, src, movelen);
^~~~~~~
net/hsr/hsr_forward.c:578:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(frame, 0, sizeof(*frame));
^~~~~~
net/hsr/hsr_forward.c:578:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(frame, 0, sizeof(*frame));
^~~~~~
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/nfc/nci/rsp.c:65:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ndev->supported_rf_interfaces,
^~~~~~
net/nfc/nci/rsp.c:65:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ndev->supported_rf_interfaces,
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
net/nfc/nci/hci.c:118:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hdev->gate2pipe, NCI_HCI_INVALID_PIPE, sizeof(hdev->gate2pipe));
^~~~~~
net/nfc/nci/hci.c:118:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hdev->gate2pipe, NCI_HCI_INVALID_PIPE, sizeof(hdev->gate2pipe));
^~~~~~
net/nfc/nci/hci.c:576:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp + 1, param, param_len);
^~~~~~
net/nfc/nci/hci.c:576:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp + 1, param, param_len);
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
>> net/nfc/nci/uart.c:120:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nu, nci_uart_drivers[driver], sizeof(struct nci_uart));
^~~~~~
net/nfc/nci/uart.c:120:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nu, nci_uart_drivers[driver], sizeof(struct nci_uart));
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/hwmon.c:70:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", to_hwmon_device(dev)->name);
^~~~~~~
drivers/hwmon/hwmon.c:70:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", to_hwmon_device(dev)->name);
^~~~~~~
drivers/hwmon/hwmon.c:312:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", val);
^~~~~~~
drivers/hwmon/hwmon.c:312:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", val);
^~~~~~~
drivers/hwmon/hwmon.c:332:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", s);
^~~~~~~
drivers/hwmon/hwmon.c:332:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", s);
^~~~~~~
drivers/hwmon/hwmon.c:912:13: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (likely(sscanf(dev_name(dev), HWMON_ID_FORMAT, &id) == 1)) {
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
drivers/hwmon/hwmon.c:912:13: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (likely(sscanf(dev_name(dev), HWMON_ID_FORMAT, &id) == 1)) {
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/media/tuners/mc44s803.c:342:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &mc44s803_tuner_ops,
^~~~~~
drivers/media/tuners/mc44s803.c:342:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &mc44s803_tuner_ops,
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
56 warnings generated.
84 warnings generated.
112 warnings generated.
140 warnings generated.
168 warnings generated.
196 warnings generated.
224 warnings generated.
drivers/mtd/tests/mtd_test.c:16:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/tests/mtd_test.c:16:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
Suppressed 216 warnings (216 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/mtd/tests/speedtest.c:49:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/tests/speedtest.c:49:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
56 warnings generated.
84 warnings generated.
112 warnings generated.
140 warnings generated.
168 warnings generated.
196 warnings generated.
224 warnings generated.
drivers/mtd/tests/mtd_test.c:16:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/tests/mtd_test.c:16:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
Suppressed 216 warnings (216 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
net/core/net_namespace.c:115:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ng->ptr[MIN_PERNET_OPS_ID], &old_ng->ptr[MIN_PERNET_OPS_ID],
^~~~~~
net/core/net_namespace.c:115:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ng->ptr[MIN_PERNET_OPS_ID], &old_ng->ptr[MIN_PERNET_OPS_ID],
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
--
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/mtd/ubi/attach.c:878:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ubi->peb_buf, 0x00, ubi->leb_size);
^~~~~~
drivers/mtd/ubi/attach.c:878:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ubi->peb_buf, 0x00, ubi->leb_size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
net/mac802154/llsec.c:29:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sec, 0, sizeof(*sec));
^~~~~~
net/mac802154/llsec.c:29:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sec, 0, sizeof(*sec));
^~~~~~
net/mac802154/llsec.c:31:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sec->params.default_key_source, 0xFF, IEEE802154_ADDR_LEN);
^~~~~~
net/mac802154/llsec.c:31:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sec->params.default_key_source, 0xFF, IEEE802154_ADDR_LEN);
^~~~~~
net/mac802154/llsec.c:603:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + 1, &addr_bytes, sizeof(addr_bytes));
^~~~~~
net/mac802154/llsec.c:603:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + 1, &addr_bytes, sizeof(addr_bytes));
^~~~~~
net/mac802154/llsec.c:604:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + 9, &frame_counter, sizeof(frame_counter));
^~~~~~
net/mac802154/llsec.c:604:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + 9, &frame_counter, sizeof(frame_counter));
^~~~~~
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
net/core/sock_reuseport.c:197:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(more_reuse->socks, reuse->socks,
^~~~~~
net/core/sock_reuseport.c:197:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(more_reuse->socks, reuse->socks,
^~~~~~
net/core/sock_reuseport.c:199:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(more_reuse->socks +
^~~~~~
net/core/sock_reuseport.c:199:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(more_reuse->socks +
^~~~~~
Suppressed 94 warnings (93 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
net/decnet/sysctl_net_decnet.c:150:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, buffer, len);
^~~~~~
net/decnet/sysctl_net_decnet.c:150:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, buffer, len);
^~~~~~
net/decnet/sysctl_net_decnet.c:174:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, addr, len);
^~~~~~
net/decnet/sysctl_net_decnet.c:174:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, addr, len);
^~~~~~
net/decnet/sysctl_net_decnet.c:197:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(devname, buffer, *lenp);
^~~~~~
net/decnet/sysctl_net_decnet.c:197:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(devname, buffer, *lenp);
^~~~~~
net/decnet/sysctl_net_decnet.c:225:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(devname, dev->name);
^~~~~~
net/decnet/sysctl_net_decnet.c:225:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(devname, dev->name);
^~~~~~
net/decnet/sysctl_net_decnet.c:232:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, devname, len);
^~~~~~
net/decnet/sysctl_net_decnet.c:232:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, devname, len);
^~~~~~
Suppressed 69 warnings (69 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
>> drivers/md/dm-unstripe.c:81:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[4], "%llu%c", &start, &dummy) != 1 || start != (sector_t)start) {
^~~~~~
drivers/md/dm-unstripe.c:81:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[4], "%llu%c", &start, &dummy) != 1 || start != (sector_t)start) {
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
vim +49 arch/arm/kernel/crash_dump.c
67742c8168ed66 Mika Westerberg 2010-05-10 17
67742c8168ed66 Mika Westerberg 2010-05-10 18 /**
67742c8168ed66 Mika Westerberg 2010-05-10 19 * copy_oldmem_page() - copy one page from old kernel memory
67742c8168ed66 Mika Westerberg 2010-05-10 20 * @pfn: page frame number to be copied
67742c8168ed66 Mika Westerberg 2010-05-10 21 * @buf: buffer where the copied page is placed
67742c8168ed66 Mika Westerberg 2010-05-10 22 * @csize: number of bytes to copy
67742c8168ed66 Mika Westerberg 2010-05-10 23 * @offset: offset in bytes into the page
67742c8168ed66 Mika Westerberg 2010-05-10 24 * @userbuf: if set, @buf is int he user address space
67742c8168ed66 Mika Westerberg 2010-05-10 25 *
67742c8168ed66 Mika Westerberg 2010-05-10 26 * This function copies one page from old kernel memory into buffer pointed by
67742c8168ed66 Mika Westerberg 2010-05-10 27 * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes
67742c8168ed66 Mika Westerberg 2010-05-10 28 * copied or negative error in case of failure.
67742c8168ed66 Mika Westerberg 2010-05-10 29 */
67742c8168ed66 Mika Westerberg 2010-05-10 30 ssize_t copy_oldmem_page(unsigned long pfn, char *buf,
67742c8168ed66 Mika Westerberg 2010-05-10 31 size_t csize, unsigned long offset,
67742c8168ed66 Mika Westerberg 2010-05-10 32 int userbuf)
67742c8168ed66 Mika Westerberg 2010-05-10 33 {
67742c8168ed66 Mika Westerberg 2010-05-10 34 void *vaddr;
67742c8168ed66 Mika Westerberg 2010-05-10 35
67742c8168ed66 Mika Westerberg 2010-05-10 36 if (!csize)
67742c8168ed66 Mika Westerberg 2010-05-10 37 return 0;
67742c8168ed66 Mika Westerberg 2010-05-10 38
8fad87bca7ac97 Liu Hua 2014-03-27 39 vaddr = ioremap(__pfn_to_phys(pfn), PAGE_SIZE);
67742c8168ed66 Mika Westerberg 2010-05-10 40 if (!vaddr)
67742c8168ed66 Mika Westerberg 2010-05-10 41 return -ENOMEM;
67742c8168ed66 Mika Westerberg 2010-05-10 42
67742c8168ed66 Mika Westerberg 2010-05-10 43 if (userbuf) {
67742c8168ed66 Mika Westerberg 2010-05-10 44 if (copy_to_user(buf, vaddr + offset, csize)) {
67742c8168ed66 Mika Westerberg 2010-05-10 45 iounmap(vaddr);
67742c8168ed66 Mika Westerberg 2010-05-10 46 return -EFAULT;
67742c8168ed66 Mika Westerberg 2010-05-10 47 }
67742c8168ed66 Mika Westerberg 2010-05-10 48 } else {
67742c8168ed66 Mika Westerberg 2010-05-10 @49 memcpy(buf, vaddr + offset, csize);
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-10 1:27 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-10 1:27 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 21587 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on masahiroy-kbuild/for-next drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc7 next-20220308]
[cannot apply to srcres258-doc/doc-zh-tw]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 8 days ago
:::::: commit date: 8 days ago
config: x86_64-randconfig-c007 (https://download.01.org/0day-ci/archive/20220310/202203100924.EykibAkU-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^
include/linux/list.h:75:2: note: Left side of '||' is false
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
include/linux/list.h:75:2: note: Left side of '||' is false
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
include/linux/list.h:75:2: note: Left side of '||' is false
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:313:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
include/linux/list.h:75:2: note: Left side of '||' is true
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:38: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/list.h:75:2: note: Taking false branch
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:2: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
include/linux/list.h:75:2: note: Loop condition is false. Exiting loop
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:2: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
include/linux/list.h:75:2: note: Dereference of null pointer
WRITE_ONCE(prev->next, new);
^
include/asm-generic/rwonce.h:61:2: note: expanded from macro 'WRITE_ONCE'
__WRITE_ONCE(x, val); \
^~~~~~~~~~~~~~~~~~~~
include/asm-generic/rwonce.h:55:30: note: expanded from macro '__WRITE_ONCE'
*(volatile typeof(x) *)&(x) = (val); \
~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
arch/x86/kernel/unwind_orc.c:38:7: warning: Value stored to 'mid' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int *mid = first, *found = first;
^~~ ~~~~~
arch/x86/kernel/unwind_orc.c:38:7: note: Value stored to 'mid' during its initialization is never read
int *mid = first, *found = first;
^~~ ~~~~~
>> arch/x86/kernel/unwind_orc.c:640:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state, 0, sizeof(*state));
^~~~~~
arch/x86/kernel/unwind_orc.c:640:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state, 0, sizeof(*state));
^~~~~~
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
Suppressed 29 warnings (29 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
Suppressed 6 warnings (6 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
arch/x86/events/core.c:812:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sched, 0, sizeof(*sched));
^~~~~~
arch/x86/events/core.c:812:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sched, 0, sizeof(*sched));
^~~~~~
arch/x86/events/core.c:1482:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cpuc->assign, assign, n*sizeof(int));
^~~~~~
arch/x86/events/core.c:1482:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cpuc->assign, assign, n*sizeof(int));
^~~~~~
arch/x86/events/core.c:1840:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%s", pmu_attr->event_str);
^~~~~~~
arch/x86/events/core.c:1840:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%s", pmu_attr->event_str);
^~~~~~~
arch/x86/events/core.c:1863:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%s",
^~~~~~~
arch/x86/events/core.c:1863:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%s",
^~~~~~~
arch/x86/events/core.c:1880:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%s", pmu_attr->event_str);
^~~~~~~
arch/x86/events/core.c:1880:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%s", pmu_attr->event_str);
^~~~~~~
arch/x86/events/core.c:1900:12: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, next_str - str + 1, "%s", str);
^~~~~~~~
arch/x86/events/core.c:1900:12: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, next_str - str + 1, "%s", str);
^~~~~~~~
arch/x86/events/core.c:1902:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%s", str);
^~~~~~~
arch/x86/events/core.c:1902:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%s", str);
^~~~~~~
arch/x86/events/core.c:1976:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "event=0x%02llx", event);
^~~~~~~
arch/x86/events/core.c:1976:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "event=0x%02llx", event);
^~~~~~~
arch/x86/events/core.c:1979:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",umask=0x%02llx", umask);
^~~~~~~
arch/x86/events/core.c:1979:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(page + ret, ",umask=0x%02llx", umask);
^~~~~~~
arch/x86/events/core.c:1982:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",edge");
^~~~~~~
arch/x86/events/core.c:1982:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(page + ret, ",edge");
^~~~~~~
arch/x86/events/core.c:1985:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",pc");
^~~~~~~
arch/x86/events/core.c:1985:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(page + ret, ",pc");
^~~~~~~
arch/x86/events/core.c:1988:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",any");
^~~~~~~
arch/x86/events/core.c:1988:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(page + ret, ",any");
^~~~~~~
arch/x86/events/core.c:1991:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",inv");
^~~~~~~
arch/x86/events/core.c:1991:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(page + ret, ",inv");
^~~~~~~
arch/x86/events/core.c:1994:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(page + ret, ",cmask=0x%02llx", cmask);
vim +640 arch/x86/kernel/unwind_orc.c
ee9f8fce996408 Josh Poimboeuf 2017-07-24 636
ee9f8fce996408 Josh Poimboeuf 2017-07-24 637 void __unwind_start(struct unwind_state *state, struct task_struct *task,
ee9f8fce996408 Josh Poimboeuf 2017-07-24 638 struct pt_regs *regs, unsigned long *first_frame)
ee9f8fce996408 Josh Poimboeuf 2017-07-24 639 {
ee9f8fce996408 Josh Poimboeuf 2017-07-24 @640 memset(state, 0, sizeof(*state));
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-04 8:24 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-04 8:24 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 1289437 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
TO: Masahiro Yamada <masahiroy@kernel.org>
CC: Arnd Bergmann <arnd@arndb.de>
CC: Marco Elver <elver@google.com>
CC: Jani Nikula <jani.nikula@intel.com>
CC: David Sterba <dsterba@suse.com>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Mark Rutland <mark.rutland@arm.com>
CC: linux-kbuild(a)vger.kernel.org
CC: llvm(a)lists.linux.dev
CC: linux-doc(a)vger.kernel.org
CC: linux-kernel(a)vger.kernel.org
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on masahiroy-kbuild/for-next drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc6 next-20220303]
[cannot apply to srcres258-doc/doc-zh-tw]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 3 days ago
:::::: commit date: 3 days ago
config: arm-randconfig-c002-20220302 (https://download.01.org/0day-ci/archive/20220304/202203041613.3o0eiEg7-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
fs/hfsplus/bnode.c:92:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kmap(*++pagep), buf, l);
^~~~~~
fs/hfsplus/bnode.c:115:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*pagep) + off, 0, l);
^~~~~~
fs/hfsplus/bnode.c:115:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*pagep) + off, 0, l);
^~~~~~
fs/hfsplus/bnode.c:121:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*++pagep), 0, l);
^~~~~~
fs/hfsplus/bnode.c:121:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*++pagep), 0, l);
^~~~~~
fs/hfsplus/bnode.c:145:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kmap(*dst_page) + src, kmap(*src_page) + src, l);
^~~~~~
fs/hfsplus/bnode.c:145:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kmap(*dst_page) + src, kmap(*src_page) + src, l);
^~~~~~
fs/hfsplus/bnode.c:152:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kmap(*++dst_page), kmap(*++src_page), l);
^~~~~~
fs/hfsplus/bnode.c:152:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kmap(*++dst_page), kmap(*++src_page), l);
^~~~~~
fs/hfsplus/bnode.c:173:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_ptr, src_ptr, l);
^~~~~~
fs/hfsplus/bnode.c:173:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_ptr, src_ptr, l);
^~~~~~
fs/hfsplus/bnode.c:205:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(kmap(*dst_page), kmap(*src_page), src);
^~~~~~~
fs/hfsplus/bnode.c:205:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(kmap(*dst_page), kmap(*src_page), src);
^~~~~~~
fs/hfsplus/bnode.c:215:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(kmap(*dst_page) + src,
^~~~~~~
fs/hfsplus/bnode.c:215:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(kmap(*dst_page) + src,
^~~~~~~
fs/hfsplus/bnode.c:236:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dst_ptr - l, src_ptr - l, l);
^~~~~~~
fs/hfsplus/bnode.c:236:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dst_ptr - l, src_ptr - l, l);
^~~~~~~
fs/hfsplus/bnode.c:254:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(kmap(*dst_page) + src,
^~~~~~~
fs/hfsplus/bnode.c:254:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(kmap(*dst_page) + src,
^~~~~~~
fs/hfsplus/bnode.c:262:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(kmap(*++dst_page),
^~~~~~~
fs/hfsplus/bnode.c:262:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(kmap(*++dst_page),
^~~~~~~
fs/hfsplus/bnode.c:285:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dst_ptr, src_ptr, l);
^~~~~~~
fs/hfsplus/bnode.c:285:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dst_ptr, src_ptr, l);
^~~~~~~
fs/hfsplus/bnode.c:328:4: warning: Value stored to 'tmp' is never read [clang-analyzer-deadcode.DeadStores]
tmp = hfs_bnode_read_u16(node, key_off);
^
fs/hfsplus/bnode.c:328:4: note: Value stored to 'tmp' is never read
fs/hfsplus/bnode.c:596:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*pagep) + node->page_offset, 0,
^~~~~~
fs/hfsplus/bnode.c:596:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*pagep) + node->page_offset, 0,
^~~~~~
fs/hfsplus/bnode.c:601:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kmap(*++pagep), 0, PAGE_SIZE);
^~~~~~
fs/hfsplus/bnode.c:601:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kmap(*++pagep), 0, PAGE_SIZE);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/squashfs/symlink.c:84:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pageaddr + length, 0, PAGE_SIZE - length);
^~~~~~
fs/squashfs/symlink.c:84:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pageaddr + length, 0, PAGE_SIZE - length);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> fs/squashfs/file_direct.c:106:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pageaddr + bytes, 0, PAGE_SIZE - bytes);
^~~~~~
fs/squashfs/file_direct.c:106:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pageaddr + bytes, 0, PAGE_SIZE - bytes);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/squashfs/xattr.c:66:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, prefix, prefix_size);
^~~~~~
fs/squashfs/xattr.c:66:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, prefix, prefix_size);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/jfs/jfs_types.h:61:33: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
pxd->len_addr = (pxd->len_addr & cpu_to_le32(~0xffffff)) |
^
fs/jfs/inode.c:211:6: note: Assuming 'create' is not equal to 0
if (create)
^~~~~~
fs/jfs/inode.c:211:2: note: Taking true branch
if (create)
^
fs/jfs/inode.c:216:7: note: Assuming the condition is true
if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/inode.c:216:6: note: Left side of '&&' is true
if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) &&
^
fs/jfs/inode.c:217:7: note: Assuming the condition is true
(!xtLookup(ip, lblock64, xlen, &xflag, &xaddr, &xlen, 0)) &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/inode.c:216:6: note: Left side of '&&' is true
if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) &&
^
fs/jfs/inode.c:218:6: note: Assuming 'xaddr' is not equal to 0
xaddr) {
^~~~~
fs/jfs/inode.c:216:2: note: Taking true branch
if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) &&
^
fs/jfs/inode.c:219:7: note: Assuming the condition is true
if (xflag & XAD_NOTRECORDED) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/inode.c:219:3: note: Taking true branch
if (xflag & XAD_NOTRECORDED) {
^
fs/jfs/inode.c:220:9: note: 'create' is not equal to 0
if (!create)
^~~~~~
fs/jfs/inode.c:220:4: note: Taking false branch
if (!create)
^
fs/jfs/inode.c:228:4: note: Calling 'PXDlength'
XADlength(&xad, xlen);
^
fs/jfs/jfs_xtree.h:38:34: note: expanded from macro 'XADlength'
#define XADlength(xad, length32) PXDlength(&(xad)->loc, length32)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_types.h:61:33: note: The left operand of '&' is a garbage value
pxd->len_addr = (pxd->len_addr & cpu_to_le32(~0xffffff)) |
~~~~~~~~~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
arch/arm/mach-s3c/pm-s3c24xx.c:68:6: warning: Value stored to 'irq' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int irq = gpio_to_irq(pin);
^~~
arch/arm/mach-s3c/pm-s3c24xx.c:68:6: note: Value stored to 'irq' during its initialization is never read
int irq = gpio_to_irq(pin);
^~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
Suppressed 60 warnings (60 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
>> arch/arm/mach-s3c/simtec-audio.c:60:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(our_name, sizeof(our_name)-1, "s3c24xx-simtec-%s", name);
^~~~~~~~
arch/arm/mach-s3c/simtec-audio.c:60:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(our_name, sizeof(our_name)-1, "s3c24xx-simtec-%s", name);
^~~~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
arch/arm/kernel/atags_compat.c:200:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(tag->u.cmdline.cmdline, params->commandline);
^~~~~~
arch/arm/kernel/atags_compat.c:200:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(tag->u.cmdline.cmdline, params->commandline);
^~~~~~
>> arch/arm/kernel/atags_compat.c:206:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(params, taglist, ((int)tag) - ((int)taglist) +
^~~~~~~
arch/arm/kernel/atags_compat.c:206:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(params, taglist, ((int)tag) - ((int)taglist) +
^~~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (32 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (10 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
kernel/printk/printk.c:156:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(devkmsg_log_str, "on");
^~~~~~
kernel/printk/printk.c:156:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(devkmsg_log_str, "on");
^~~~~~
kernel/printk/printk.c:158:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(devkmsg_log_str, "off");
^~~~~~
kernel/printk/printk.c:158:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(devkmsg_log_str, "off");
^~~~~~
kernel/printk/printk.c:2399:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(buf + 4, str, sizeof(buf) - 5);
^~~~~~~
kernel/printk/printk.c:2399:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(buf + 4, str, sizeof(buf) - 5);
^~~~~~~
kernel/printk/printk.c:2401:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(buf, str, sizeof(buf) - 1);
^~~~~~~
kernel/printk/printk.c:2401:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(buf, str, sizeof(buf) - 1);
^~~~~~~
kernel/printk/printk.c:2633:2: warning: Value stored to 'do_cond_resched' is never read [clang-analyzer-deadcode.DeadStores]
do_cond_resched = console_may_schedule;
^ ~~~~~~~~~~~~~~~~~~~~
kernel/printk/printk.c:2633:2: note: Value stored to 'do_cond_resched' is never read
do_cond_resched = console_may_schedule;
^ ~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/xfs/xfs_fsmap.c:353:26: warning: Access to field 'bc_mp' results in a dereference of a null pointer (loaded from variable 'cur') [clang-analyzer-core.NullDereference]
struct xfs_mount *mp = cur->bc_mp;
^
fs/xfs/xfs_fsmap.c:729:9: note: Calling '__xfs_getfsmap_datadev'
return __xfs_getfsmap_datadev(tp, keys, info,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/xfs_fsmap.c:594:6: note: Assuming 'eofs' is > field 'fmr_physical'
if (keys[0].fmr_physical >= eofs)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/xfs_fsmap.c:594:2: note: Taking false branch
if (keys[0].fmr_physical >= eofs)
^
fs/xfs/xfs_fsmap.c:597:33: note: Assuming '__UNIQUE_ID___x1474' is >= '__UNIQUE_ID___y1475'
end_fsb = XFS_DADDR_TO_FSB(mp, min(eofs - 1, keys[1].fmr_physical));
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
fs/xfs/libxfs/xfs_format.h:430:25: note: expanded from macro 'XFS_DADDR_TO_FSB'
xfs_daddr_to_agno(mp,d), xfs_daddr_to_agbno(mp,d))
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_format.h:663:20: note: expanded from macro 'XFS_AGB_TO_FSB'
(((xfs_fsblock_t)(agno) << (mp)->m_sb.sb_agblklog) | (agbno))
^~~~
fs/xfs/xfs_fsmap.c:597:33: note: '?' condition is false
end_fsb = XFS_DADDR_TO_FSB(mp, min(eofs - 1, keys[1].fmr_physical));
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
--
^~~~~~
kernel/bpf/hashtab.c:801:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(next_key, next_l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:801:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(next_key, next_l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:819:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(next_key, next_l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:819:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(next_key, next_l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:874:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(this_cpu_ptr(pptr), value, htab->map.value_size);
^~~~~~
kernel/bpf/hashtab.c:874:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(this_cpu_ptr(pptr), value, htab->map.value_size);
^~~~~~
kernel/bpf/hashtab.c:906:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(per_cpu_ptr(pptr, cpu), 0, size);
^~~~~~
kernel/bpf/hashtab.c:906:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(per_cpu_ptr(pptr, cpu), 0, size);
^~~~~~
kernel/bpf/hashtab.c:968:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(l_new->key, key, key_size);
^~~~~~
kernel/bpf/hashtab.c:968:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(l_new->key, key, key_size);
^~~~~~
kernel/bpf/hashtab.c:990:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(l_new->key + round_up(key_size, 8), value, size);
^~~~~~
kernel/bpf/hashtab.c:990:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(l_new->key + round_up(key_size, 8), value, size);
^~~~~~
kernel/bpf/hashtab.c:1708:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_key, l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:1708:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_key, l->key, key_size);
^~~~~~
kernel/bpf/hashtab.c:1904:3: warning: Value stored to 'b' is never read [clang-analyzer-deadcode.DeadStores]
b = &htab->buckets[bucket_id++];
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/bpf/hashtab.c:1904:3: note: Value stored to 'b' is never read
b = &htab->buckets[bucket_id++];
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
arch/arm/kernel/early_printk.c:20:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, s, l);
^~~~~~
arch/arm/kernel/early_printk.c:20:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, s, l);
^~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (44 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
arch/arm/mm/nommu.c:173:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, len);
^~~~~~
arch/arm/mm/nommu.c:173:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, len);
^~~~~~
Suppressed 47 warnings (44 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (32 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/squashfs/lz4_wrapper.c:105:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buff, data + offset, avail);
^~~~~~
fs/squashfs/lz4_wrapper.c:105:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buff, data + offset, avail);
^~~~~~
fs/squashfs/lz4_wrapper.c:122:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, buff, bytes);
^~~~~~
fs/squashfs/lz4_wrapper.c:122:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, buff, bytes);
^~~~~~
fs/squashfs/lz4_wrapper.c:125:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, buff, PAGE_SIZE);
^~~~~~
fs/squashfs/lz4_wrapper.c:125:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, buff, PAGE_SIZE);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/orangefs/dcache.c:36:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.lookup.d_name,
^~~~~~~
fs/orangefs/dcache.c:36:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.lookup.d_name,
^~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/orangefs/inode.c:836:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = posix_acl_chmod(&init_user_ns, inode, inode->i_mode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/orangefs/inode.c:836:3: note: Value stored to 'ret' is never read
ret = posix_acl_chmod(&init_user_ns, inode, inode->i_mode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/orangefs/inode.c:914:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/inode.c:914:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/orangefs/orangefs-sysfs.c:630:9: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
rc = sscanf(buf, "%d %d", &val1, &val2);
^~~~~~
fs/orangefs/orangefs-sysfs.c:630:9: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
rc = sscanf(buf, "%d %d", &val1, &val2);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
fs/orangefs/super.c:118:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&orangefs_inode->refn.khandle, 0, 16);
^~~~~~
fs/orangefs/super.c:118:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&orangefs_inode->refn.khandle, 0, 16);
^~~~~~
fs/orangefs/super.c:121:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(orangefs_inode->link_target, 0, sizeof(orangefs_inode->link_target));
^~~~~~
fs/orangefs/super.c:121:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(orangefs_inode->link_target, 0, sizeof(orangefs_inode->link_target));
^~~~~~
fs/orangefs/super.c:204:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf->f_fsid, &ORANGEFS_SB(sb)->fs_id, sizeof(buf->f_fsid));
^~~~~~
fs/orangefs/super.c:204:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf->f_fsid, &ORANGEFS_SB(sb)->fs_id, sizeof(buf->f_fsid));
^~~~~~
fs/orangefs/super.c:256:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.fs_mount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:256:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.fs_mount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:403:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(op->upcall.req.fs_umount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:403:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(op->upcall.req.fs_umount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:480:22: warning: Value stored to 'sb' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct super_block *sb = ERR_PTR(-EINVAL);
^~ ~~~~~~~~~~~~~~~~
fs/orangefs/super.c:480:22: note: Value stored to 'sb' during its initialization is never read
struct super_block *sb = ERR_PTR(-EINVAL);
^~ ~~~~~~~~~~~~~~~~
fs/orangefs/super.c:497:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.fs_mount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:497:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.fs_mount.orangefs_config_server,
^~~~~~~
fs/orangefs/super.c:546:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(ORANGEFS_SB(sb)->devname,
--
fs/binfmt_flat.c:1030:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
start_thread(regs, start_addr, current->mm->start_stack);
^
arch/arm/include/asm/processor.h:61:2: note: expanded from macro 'start_thread'
memset(regs->uregs, 0, sizeof(regs->uregs)); \
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
arch/arm/mach-s3c/adc.c:200:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = wait_event_timeout(wake, client->result >= 0, HZ / 2);
^
arch/arm/mach-s3c/adc.c:200:2: note: Value stored to 'ret' is never read
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
arch/arm/mach-s3c/pm-gpio.c:37:6: warning: Value stored to 'old_gpdat' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
u32 old_gpdat = __raw_readl(base + OFFS_DAT);
^~~~~~~~~
arch/arm/mach-s3c/pm-gpio.c:37:6: note: Value stored to 'old_gpdat' during its initialization is never read
u32 old_gpdat = __raw_readl(base + OFFS_DAT);
^~~~~~~~~
arch/arm/mach-s3c/pm-gpio.c:124:6: warning: Value stored to 'old_gpdat' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
u32 old_gpdat = __raw_readl(base + OFFS_DAT);
^~~~~~~~~
arch/arm/mach-s3c/pm-gpio.c:124:6: note: Value stored to 'old_gpdat' during its initialization is never read
u32 old_gpdat = __raw_readl(base + OFFS_DAT);
^~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
kernel/fork.c:1051:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mm->rss_stat, 0, sizeof(mm->rss_stat));
^~~~~~
kernel/fork.c:1051:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mm->rss_stat, 0, sizeof(mm->rss_stat));
^~~~~~
kernel/fork.c:1102:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mm, 0, sizeof(*mm));
^~~~~~
kernel/fork.c:1102:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mm, 0, sizeof(*mm));
^~~~~~
kernel/fork.c:1446:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mm, oldmm, sizeof(*mm));
^~~~~~
kernel/fork.c:1446:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mm, oldmm, sizeof(*mm));
^~~~~~
kernel/fork.c:1575:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig->action, current->sighand->action, sizeof(sig->action));
^~~~~~
kernel/fork.c:1575:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig->action, current->sighand->action, sizeof(sig->action));
^~~~~~
kernel/fork.c:1643:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sig->rlim, current->signal->rlim, sizeof sig->rlim);
^~~~~~
kernel/fork.c:1643:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sig->rlim, current->signal->rlim, sizeof sig->rlim);
^~~~~~
kernel/fork.c:2108:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->irqtrace, 0, sizeof(p->irqtrace));
^~~~~~
kernel/fork.c:2108:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->irqtrace, 0, sizeof(p->irqtrace));
^~~~~~
Suppressed 73 warnings (70 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/arm/mach-s3c/init.c:114:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfgptr, cfg, sizeof(struct s3c2410_uartcfg) * no);
^~~~~~
arch/arm/mach-s3c/init.c:114:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfgptr, cfg, sizeof(struct s3c2410_uartcfg) * no);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/nilfs2/inode.c:643:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)raw_inode + sizeof(*raw_inode), 0,
^~~~~~
fs/nilfs2/inode.c:643:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)raw_inode + sizeof(*raw_inode), 0,
^~~~~~
fs/nilfs2/inode.c:668:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(raw_inode, 0, NILFS_MDT(ifile)->mi_entry_size);
^~~~~~
fs/nilfs2/inode.c:668:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(raw_inode, 0, NILFS_MDT(ifile)->mi_entry_size);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
fs/nilfs2/dir.c:161:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = "rec_len is smaller than minimal";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:161:2: note: Value stored to 'error' is never read
error = "rec_len is smaller than minimal";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:164:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = "unaligned directory entry";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:164:2: note: Value stored to 'error' is never read
error = "unaligned directory entry";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:167:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = "rec_len is too small for name_len";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:167:2: note: Value stored to 'error' is never read
error = "rec_len is too small for name_len";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:170:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = "directory entry across blocks";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:170:2: note: Value stored to 'error' is never read
error = "directory entry across blocks";
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:179:2: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p = (struct nilfs_dir_entry *)(kaddr + offs);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:179:2: note: Value stored to 'p' is never read
p = (struct nilfs_dir_entry *)(kaddr + offs);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nilfs2/dir.c:518:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(de->name, name, namelen);
^~~~~~
fs/nilfs2/dir.c:518:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(de->name, name, namelen);
^~~~~~
fs/nilfs2/dir.c:597:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr, 0, chunk_size);
^~~~~~
fs/nilfs2/dir.c:597:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr, 0, chunk_size);
^~~~~~
fs/nilfs2/dir.c:601:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(de->name, ".\0\0", 4);
^~~~~~
fs/nilfs2/dir.c:601:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(de->name, ".\0\0", 4);
^~~~~~
fs/nilfs2/dir.c:609:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(de->name, "..\0", 4);
^~~~~~
fs/nilfs2/dir.c:609:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(de->name, "..\0", 4);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/ntfs/inode.c:130:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ni->name, na->name, i);
^~~~~~
fs/ntfs/inode.c:130:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ni->name, na->name, i);
^~~~~~
fs/ntfs/inode.c:749:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ni->attr_list, (u8*)a + le16_to_cpu(
^~~~~~
fs/ntfs/inode.c:749:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ni->attr_list, (u8*)a + le16_to_cpu(
^~~~~~
fs/ntfs/inode.c:1814:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char*)m + (i << sb->s_blocksize_bits), bh->b_data,
--
^
fs/jfs/jfs_dmap.c:4012:6: note: 'sz' is < 'nblocks'
if (sz < nblocks)
^~
fs/jfs/jfs_dmap.c:4012:2: note: Taking true branch
if (sz < nblocks)
^
fs/jfs/jfs_dmap.c:4016:2: note: Returning the value 57
return (l2sz - L2MAXAG);
^~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:3407:13: note: Returning from 'dbGetL2AGSize'
l2agsize = dbGetL2AGSize(newsize);
^~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:3407:2: note: The value 57 is assigned to 'l2agsize'
l2agsize = dbGetL2AGSize(newsize);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:3411:21: note: The result of the left shift is undefined due to shifting by '57', which is greater or equal to the width of type 'int'
bmp->db_agsize = 1 << l2agsize;
^ ~~~~~~~~
fs/jfs/jfs_dmap.c:3750:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dp->wmap[0], 0, LPERDMAP * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3750:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dp->wmap[0], 0, LPERDMAP * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3751:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dp->pmap[0], 0, LPERDMAP * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3751:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dp->pmap[0], 0, LPERDMAP * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3786:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dp->wmap[w], 0, nw * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3786:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dp->wmap[w], 0, nw * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3787:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dp->pmap[w], 0, nw * 4);
^~~~~~
fs/jfs/jfs_dmap.c:3787:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dp->pmap[w], 0, nw * 4);
^~~~~~
fs/jfs/jfs_dmap.c:4011:15: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 's64' [clang-analyzer-core.UndefinedBinaryOperatorResult]
sz = (s64) 1 << l2sz;
^
fs/jfs/jfs_dmap.c:3392:2: note: Loop condition is false. Exiting loop
jfs_info("dbExtendFS: blkno:%Ld nblocks:%Ld newsize:%Ld",
^
fs/jfs/jfs_debug.h:84:31: note: expanded from macro 'jfs_info'
#define jfs_info(fmt, arg...) do {} while (0)
^
fs/jfs/jfs_dmap.c:3404:21: note: Assuming the condition is true
bmp->db_maxlevel = BMAPSZTOLEV(bmp->db_mapsize);
^
fs/jfs/jfs_dmap.h:117:4: note: expanded from macro 'BMAPSZTOLEV'
(((size) <= MAXL0SIZE) ? 0 : ((size) <= MAXL1SIZE) ? 1 : 2)
^~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:3404:21: note: '?' condition is true
bmp->db_maxlevel = BMAPSZTOLEV(bmp->db_mapsize);
^
fs/jfs/jfs_dmap.h:117:3: note: expanded from macro 'BMAPSZTOLEV'
(((size) <= MAXL0SIZE) ? 0 : ((size) <= MAXL1SIZE) ? 1 : 2)
^
fs/jfs/jfs_dmap.c:3407:13: note: Calling 'dbGetL2AGSize'
l2agsize = dbGetL2AGSize(newsize);
^~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:4001:6: note: Assuming the condition is false
if (nblocks < BPERDMAP * MAXAG)
^~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jfs/jfs_dmap.c:4001:2: note: Taking false branch
if (nblocks < BPERDMAP * MAXAG)
^
fs/jfs/jfs_dmap.c:4006:7: note: The value 64 is assigned to 'l2sz'
for (l2sz = 64; l2sz >= 0; l2sz--, m >>= 1) {
^~~~~~~~~
fs/jfs/jfs_dmap.c:4006:2: note: Loop condition is true. Entering loop body
for (l2sz = 64; l2sz >= 0; l2sz--, m >>= 1) {
^
fs/jfs/jfs_dmap.c:4007:7: note: Assuming the condition is true
if (m & nblocks)
^~~~~~~~~~~
fs/jfs/jfs_dmap.c:4007:3: note: Taking true branch
if (m & nblocks)
^
fs/jfs/jfs_dmap.c:4008:4: note: Execution continues on line 4011
break;
^
fs/jfs/jfs_dmap.c:4011:15: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 's64'
sz = (s64) 1 << l2sz;
^ ~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
security/integrity/evm/evm_secfs.c:48:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(temp, "%d", (evm_initialized & ~EVM_SETUP_COMPLETE));
^~~~~~~
security/integrity/evm/evm_secfs.c:48:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(temp, "%d", (evm_initialized & ~EVM_SETUP_COMPLETE));
^~~~~~~
>> security/integrity/evm/evm_secfs.c:159:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(temp + offset, "%s\n", xattr->name);
^~~~~~~
security/integrity/evm/evm_secfs.c:159:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(temp + offset, "%s\n", xattr->name);
^~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
mm/debug.c:266:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page, PAGE_POISON_PATTERN, size);
^~~~~~
mm/debug.c:266:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page, PAGE_POISON_PATTERN, size);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
mm/nommu.c:208:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, addr, count);
^~~~~~
mm/nommu.c:208:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, addr, count);
^~~~~~
mm/nommu.c:867:6: warning: Value stored to 'prot' is never read [clang-analyzer-deadcode.DeadStores]
prot |= PROT_EXEC;
^
mm/nommu.c:867:6: note: Value stored to 'prot' is never read
mm/nommu.c:885:4: warning: Value stored to 'prot' is never read [clang-analyzer-deadcode.DeadStores]
prot |= PROT_EXEC;
^
mm/nommu.c:885:4: note: Value stored to 'prot' is never read
mm/nommu.c:996:12: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
total = 1 << order;
^
mm/nommu.c:1077:6: note: 'ret' is >= 0
if (ret < 0)
^~~
mm/nommu.c:1077:2: note: Taking false branch
if (ret < 0)
^
mm/nommu.c:1090:6: note: Assuming 'region' is non-null
if (!region)
^~~~~~~
mm/nommu.c:1090:2: note: Taking false branch
if (!region)
^
mm/nommu.c:1094:6: note: Assuming 'vma' is non-null
if (!vma)
^~~~
mm/nommu.c:1094:2: note: Taking false branch
if (!vma)
^
mm/nommu.c:1104:6: note: 'file' is null
if (file) {
^~~~
mm/nommu.c:1104:2: note: Taking false branch
if (file) {
^
mm/nommu.c:1119:6: note: Assuming the condition is false
if (vm_flags & VM_MAYSHARE) {
^~~~~~~~~~~~~~~~~~~~~~
mm/nommu.c:1119:2: note: Taking false branch
if (vm_flags & VM_MAYSHARE) {
^
mm/nommu.c:1216:6: note: 'file' is null
if (file && vma->vm_flags & VM_SHARED)
^~~~
mm/nommu.c:1216:11: note: Left side of '&&' is false
if (file && vma->vm_flags & VM_SHARED)
^
mm/nommu.c:1219:9: note: Calling 'do_mmap_private'
ret = do_mmap_private(vma, region, len, capabilities);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/nommu.c:974:2: note: Taking false branch
if (capabilities & NOMMU_MAP_DIRECT) {
^
mm/nommu.c:995:10: note: Calling 'get_order'
order = get_order(len);
^~~~~~~~~~~~~~
include/asm-generic/getorder.h:31:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/asm-generic/getorder.h:44:9: note: Calling 'fls'
return fls(size);
^~~~~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
--
^
fs/ntfs/aops.c:1104:2: note: Taking false branch
BUG_ON(!PageUptodate(page));
^
include/asm-generic/bug.h:65:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/ntfs/aops.c:1104:2: note: Loop condition is false. Exiting loop
BUG_ON(!PageUptodate(page));
^
include/asm-generic/bug.h:65:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/ntfs/aops.c:1106:2: note: Loop condition is true. Entering loop body
for (i = 0; i < nr_bhs; i++) {
^
fs/ntfs/aops.c:1110:3: note: Taking false branch
if (i % bhs_per_rec)
^
fs/ntfs/aops.c:1114:7: note: 'is_mft' is false
if (is_mft) {
^~~~~~
fs/ntfs/aops.c:1114:3: note: Taking false branch
if (is_mft) {
^
fs/ntfs/aops.c:1151:7: note: Assuming 'err2' is not equal to 0
if (unlikely(err2)) {
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/ntfs/aops.c:1151:3: note: Taking true branch
if (unlikely(err2)) {
^
fs/ntfs/aops.c:1152:9: note: 'err' is 0
if (!err || err == -ENOMEM)
^~~
fs/ntfs/aops.c:1152:13: note: Left side of '||' is true
if (!err || err == -ENOMEM)
^
fs/ntfs/aops.c:1166:13: note: The value 1 is assigned to 'i'
} while (++i % bhs_per_rec);
^~~
fs/ntfs/aops.c:1163:4: note: Loop condition is true. Execution continues on line 1164
do {
^
fs/ntfs/aops.c:1164:5: note: 1st function call argument is an uninitialized value
clear_buffer_dirty(bhs[i]);
^ ~~~~~~
fs/ntfs/aops.c:1482:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8*)ctx->attr +
^~~~~~
fs/ntfs/aops.c:1482:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8*)ctx->attr +
^~~~~~
fs/ntfs/aops.c:1486:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr + attr_len, 0, PAGE_SIZE - attr_len);
^~~~~~
fs/ntfs/aops.c:1486:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr + attr_len, 0, PAGE_SIZE - attr_len);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/filesystems.c:227:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, p->name, len);
^~~~~~
fs/filesystems.c:227:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, p->name, len);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/hfsplus/xattr_security.c:53:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(xattr_name, XATTR_SECURITY_PREFIX);
^~~~~~
fs/hfsplus/xattr_security.c:53:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(xattr_name, XATTR_SECURITY_PREFIX);
^~~~~~
fs/hfsplus/xattr_security.c:54:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(xattr_name +
^~~~~~
fs/hfsplus/xattr_security.c:54:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(xattr_name +
^~~~~~
fs/hfsplus/xattr_security.c:56:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(xattr_name +
^~~~~~
fs/hfsplus/xattr_security.c:56:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(xattr_name +
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> block/partitions/aix.c:95:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, data, copied);
^~~~~~
block/partitions/aix.c:95:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, data, copied);
^~~~~~
>> block/partitions/aix.c:183:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp),
^~~~~~~~
block/partitions/aix.c:183:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp),
^~~~~~~~
block/partitions/aix.c:189:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp),
^~~~~~~~
block/partitions/aix.c:189:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp),
^~~~~~~~
block/partitions/aix.c:259:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), " <%s>\n",
^~~~~~~~
block/partitions/aix.c:259:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), " <%s>\n",
^~~~~~~~
block/partitions/aix.c:272:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), "%s", n[i].name);
^~~~~~~~
block/partitions/aix.c:272:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), "%s", n[i].name);
^~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
security/integrity/ima/ima_init.c:57:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iint, 0, sizeof(*iint));
^~~~~~
security/integrity/ima/ima_init.c:57:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iint, 0, sizeof(*iint));
^~~~~~
security/integrity/ima/ima_init.c:58:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hash, 0, sizeof(hash));
^~~~~~
security/integrity/ima/ima_init.c:58:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hash, 0, sizeof(hash));
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
security/commoncap.c:441:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:441:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:472:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:472:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cap->data, &nscap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:582:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:582:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32);
^~~~~~
security/commoncap.c:660:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));
^~~~~~
security/commoncap.c:660:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cpu_caps, 0, sizeof(struct cpu_vfs_cap_data));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
fs/ext4/xattr.c:368:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)buf + blocksize * i, bhs[i]->b_data,
^~~~~~
fs/ext4/xattr.c:368:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)buf + blocksize * i, bhs[i]->b_data,
^~~~~~
fs/ext4/xattr.c:563:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, p, size);
^~~~~~
fs/ext4/xattr.c:563:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, p, size);
^~~~~~
fs/ext4/xattr.c:618:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, p, size);
^~~~~~
fs/ext4/xattr.c:618:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, p, size);
^~~~~~
fs/ext4/xattr.c:678:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, prefix, prefix_len);
^~~~~~
fs/ext4/xattr.c:678:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, prefix, prefix_len);
^~~~~~
fs/ext4/xattr.c:680:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, entry->e_name, entry->e_name_len);
--
^~~~~~~~~~~~~~
drivers/gpio/gpio-pca953x.c:382:36: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
int addr = (reg & PCAL_GPIO_MASK) << bank_shift;
^ ~~~~~~~~~~
include/linux/bitmap.h:552:13: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
map[index] &= ~(0xFFUL << offset);
^
drivers/gpio/gpio-pca953x.c:533:8: note: Calling 'pca953x_read_regs'
ret = pca953x_read_regs(chip, chip->regs->output, reg_val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpio/gpio-pca953x.c:414:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/gpio/gpio-pca953x.c:414:2: note: Taking false branch
if (ret < 0) {
^
drivers/gpio/gpio-pca953x.c:419:7: note: The value 0 is assigned to 'i'
for (i = 0; i < NBANK(chip); i++)
^~~~~
drivers/gpio/gpio-pca953x.c:419:14: note: Assuming the condition is true
for (i = 0; i < NBANK(chip); i++)
^~~~~~~~~~~~~~~
drivers/gpio/gpio-pca953x.c:419:2: note: Loop condition is true. Entering loop body
for (i = 0; i < NBANK(chip); i++)
^
drivers/gpio/gpio-pca953x.c:420:36: note: Passing the value 0 via 3rd parameter 'start'
bitmap_set_value8(val, value[i], i * BANK_SZ);
^~~~~~~~~~~
drivers/gpio/gpio-pca953x.c:420:3: note: Calling 'bitmap_set_value8'
bitmap_set_value8(val, value[i], i * BANK_SZ);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/bitmap.h:549:2: note: 'index' initialized to 0
const size_t index = BIT_WORD(start);
^~~~~~~~~~~~~~~~~~
include/linux/bitmap.h:552:13: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
map[index] &= ~(0xFFUL << offset);
~~~~~~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
lib/crypto/blake2s-generic.c:56:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:56:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, state->h, 32);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(v, state->h, 32);
^~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/pinctrl/devicetree.c:380:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(out_args, 0, sizeof(*out_args));
^~~~~~
drivers/pinctrl/devicetree.c:380:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(out_args, 0, sizeof(*out_args));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/pinctrl/pinctrl-axp209.c:204:22: warning: Value stored to 'pctl' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct axp20x_pctl *pctl = pinctrl_dev_get_drvdata(pctldev);
^~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-axp209.c:204:22: note: Value stored to 'pctl' during its initialization is never read
struct axp20x_pctl *pctl = pinctrl_dev_get_drvdata(pctldev);
^~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
kernel/cgroup/cgroup-v1.c:1101:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(root->release_agent_path, ctx->release_agent);
^~~~~~
kernel/cgroup/cgroup-v1.c:1101:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(root->release_agent_path, ctx->release_agent);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
>> kernel/utsname.c:70:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ns->name, &old_ns->name, sizeof(ns->name));
^~~~~~
kernel/utsname.c:70:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ns->name, &old_ns->name, sizeof(ns->name));
^~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/iomap/buffered-io.c:234:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, iomap->inline_data, size);
^~~~~~
fs/iomap/buffered-io.c:234:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, iomap->inline_data, size);
^~~~~~
fs/iomap/buffered-io.c:235:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr + size, 0, PAGE_SIZE - poff - size);
^~~~~~
fs/iomap/buffered-io.c:235:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr + size, 0, PAGE_SIZE - poff - size);
^~~~~~
fs/iomap/buffered-io.c:705:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iomap_inline_data(iomap, pos), addr, copied);
^~~~~~
fs/iomap/buffered-io.c:705:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iomap_inline_data(iomap, pos), addr, copied);
^~~~~~
fs/iomap/buffered-io.c:1050:6: warning: Value stored to 'start' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
u64 start = bio->bi_iter.bi_sector;
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~
fs/iomap/buffered-io.c:1050:6: note: Value stored to 'start' during its initialization is never read
u64 start = bio->bi_iter.bi_sector;
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~
fs/iomap/buffered-io.c:1051:9: warning: Value stored to 'offset' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
loff_t offset = ioend->io_offset;
^~~~~~ ~~~~~~~~~~~~~~~~
fs/iomap/buffered-io.c:1051:9: note: Value stored to 'offset' during its initialization is never read
loff_t offset = ioend->io_offset;
^~~~~~ ~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
lib/oid_registry.c:142:16: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = count = snprintf(buffer, bufsize, "%u.%u", n / 40, n % 40);
^~~~~~~~
lib/oid_registry.c:142:16: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = count = snprintf(buffer, bufsize, "%u.%u", n / 40, n % 40);
^~~~~~~~
lib/oid_registry.c:149:3: warning: Value stored to 'num' is never read [clang-analyzer-deadcode.DeadStores]
num = 0;
^ ~
lib/oid_registry.c:149:3: note: Value stored to 'num' is never read
num = 0;
^ ~
lib/oid_registry.c:163:18: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += count = snprintf(buffer, bufsize, ".%lu", num);
^~~~~~~~
lib/oid_registry.c:163:18: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret += count = snprintf(buffer, bufsize, ".%lu", num);
^~~~~~~~
lib/oid_registry.c:173:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buffer, bufsize, "(bad)");
^~~~~~~~
lib/oid_registry.c:173:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buffer, bufsize, "(bad)");
^~~~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (16 in non-user code, 7 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
arch/arm/include/asm/atomic.h:234:20: warning: Access to field 'counter' results in a dereference of a null pointer (loaded from variable 'v') [clang-analyzer-core.NullDereference]
ATOMIC_OPS(andnot, &= ~, bic)
^
lib/sbitmap.c:669:14: note: Assuming 'i' is < 'nr_tags'
for (i = 0; i < nr_tags; i++) {
^~~~~~~~~~~
lib/sbitmap.c:669:2: note: Loop condition is true. Entering loop body
for (i = 0; i < nr_tags; i++) {
^
lib/sbitmap.c:675:8: note: 'addr' is null
if (!addr) {
^~~~
lib/sbitmap.c:675:3: note: Taking true branch
if (!addr) {
^
lib/sbitmap.c:669:14: note: Assuming 'i' is < 'nr_tags'
for (i = 0; i < nr_tags; i++) {
^~~~~~~~~~~
lib/sbitmap.c:669:2: note: Loop condition is true. Entering loop body
for (i = 0; i < nr_tags; i++) {
^
lib/sbitmap.c:674:3: note: Value assigned to 'this_addr'
this_addr = &sb->map[SB_NR_TO_INDEX(sb, tag)].word;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/sbitmap.c:675:7: note: Assuming 'addr' is null
if (!addr) {
^~~~~
lib/sbitmap.c:675:3: note: Taking true branch
if (!addr) {
--
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/regulator/pca9450-regulator.c:171:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
i <<= ffs(desc->vsel_mask) - 1;
^
drivers/regulator/pca9450-regulator.c:191:2: note: Loop condition is true. Entering loop body
for (i = 0; i < PCA9450_DVS_LEVEL_MAX; i++) {
^
drivers/regulator/pca9450-regulator.c:192:3: note: Control jumps to 'case PCA9450_DVS_LEVEL_RUN:' @line 193
switch (i) {
^
drivers/regulator/pca9450-regulator.c:197:4: note: Execution continues on line 207
break;
^
drivers/regulator/pca9450-regulator.c:207:9: note: Calling 'buck_set_dvs'
ret = buck_set_dvs(desc, np, cfg->regmap, prop, reg, mask);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/pca9450-regulator.c:160:8: note: Calling 'of_property_read_u32'
ret = of_property_read_u32(np, prop, &uv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:9: note: Calling 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1269:6: note: Assuming 'ret' is >= 0
if (ret >= 0)
^~~~~~~~
include/linux/of.h:1269:2: note: Taking true branch
if (ret >= 0)
^
include/linux/of.h:1270:3: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
include/linux/of.h:1323:9: note: Returning from 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:2: note: Returning zero, which participates in a condition later
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/pca9450-regulator.c:160:8: note: Returning from 'of_property_read_u32'
ret = of_property_read_u32(np, prop, &uv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/pca9450-regulator.c:161:2: note: Taking false branch
if (ret == -EINVAL)
^
drivers/regulator/pca9450-regulator.c:163:11: note: 'ret' is 0
else if (ret)
^~~
drivers/regulator/pca9450-regulator.c:163:7: note: Taking false branch
else if (ret)
^
drivers/regulator/pca9450-regulator.c:166:14: note: Assuming 'i' is < field 'n_voltages'
for (i = 0; i < desc->n_voltages; i++) {
^~~~~~~~~~~~~~~~~~~~
drivers/regulator/pca9450-regulator.c:166:2: note: Loop condition is true. Entering loop body
for (i = 0; i < desc->n_voltages; i++) {
^
drivers/regulator/pca9450-regulator.c:168:7: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/regulator/pca9450-regulator.c:168:3: note: Taking false branch
if (ret < 0)
^
drivers/regulator/pca9450-regulator.c:170:7: note: Assuming 'ret' is equal to 'uv'
if (ret == uv) {
^~~~~~~~~
drivers/regulator/pca9450-regulator.c:170:3: note: Taking true branch
if (ret == uv) {
^
drivers/regulator/pca9450-regulator.c:171:6: note: Assigned value is garbage or undefined
i <<= ffs(desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/iomap/direct-io.c:405:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
fs/iomap/direct-io.c:405:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
>> drivers/tty/serial/8250/serial_cs.c:358:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&uart, 0, sizeof(uart));
^~~~~~
drivers/tty/serial/8250/serial_cs.c:358:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&uart, 0, sizeof(uart));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/libfs.c:837:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(to, from + pos, count);
^~~~~~
fs/libfs.c:837:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(to, from + pos, count);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
Suppressed 67 warnings (61 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
kernel/sched/deadline.c:1534:22: warning: Value stored to 'p' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct task_struct *p = dl_task_of(dl_se);
^ ~~~~~~~~~~~~~~~~~
kernel/sched/deadline.c:1534:22: note: Value stored to 'p' during its initialization is never read
struct task_struct *p = dl_task_of(dl_se);
^ ~~~~~~~~~~~~~~~~~
Suppressed 63 warnings (61 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
kernel/sched/autogroup.c:267:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, buflen, "%s-%ld", "/autogroup", tg->autogroup->id);
^~~~~~~~
kernel/sched/autogroup.c:267:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, buflen, "%s-%ld", "/autogroup", tg->autogroup->id);
^~~~~~~~
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
kernel/sched/cpuacct.c:269:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cputime, 0, sizeof(cputime));
^~~~~~
kernel/sched/cpuacct.c:269:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cputime, 0, sizeof(cputime));
^~~~~~
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/char/ipmi/ipmi_plat_data.c:21:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:21:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(r));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(r));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/char/ipmi/ipmi_ssif.c:750:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->rsp, data, len);
^~~~~~
drivers/char/ipmi/ipmi_ssif.c:750:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->rsp, data, len);
^~~~~~
drivers/char/ipmi/ipmi_ssif.c:817:37: warning: Array access (via field 'rsp') results in a null pointer dereference [clang-analyzer-core.NullDereference]
if ((result < 0) || (len < 3) || (msg->rsp[2] != 0)) {
^ ~~~
drivers/char/ipmi/ipmi_ssif.c:618:6: note: Assuming 'result' is >= 0
if (result < 0) {
^~~~~~~~~~
drivers/char/ipmi/ipmi_ssif.c:618:2: note: Taking false branch
if (result < 0) {
^
drivers/char/ipmi/ipmi_ssif.c:642:7: note: Assuming 'len' is > 1
if ((len > 1) && (ssif_info->multi_pos == 0)
^~~~~~~
drivers/char/ipmi/ipmi_ssif.c:642:6: note: Left side of '&&' is true
if ((len > 1) && (ssif_info->multi_pos == 0)
^
drivers/char/ipmi/ipmi_ssif.c:642:20: note: Assuming field 'multi_pos' is equal to 0
if ((len > 1) && (ssif_info->multi_pos == 0)
--
47 warnings generated.
fs/xfs/xfs_itable.c:309:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bs1, 0, sizeof(struct xfs_bstat));
^~~~~~
fs/xfs/xfs_itable.c:309:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bs1, 0, sizeof(struct xfs_bstat));
^~~~~~
fs/xfs/xfs_itable.c:437:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ig1, 0, sizeof(struct xfs_inogrp));
^~~~~~
fs/xfs/xfs_itable.c:437:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ig1, 0, sizeof(struct xfs_inogrp));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/dma/idma64.c:406:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&idma64c->config, config, sizeof(idma64c->config));
^~~~~~
drivers/dma/idma64.c:406:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&idma64c->config, config, sizeof(idma64c->config));
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/dma/nbpfaxi.c:700:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = dchan->device->dev;
^~~ ~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:700:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = dchan->device->dev;
^~~ ~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:833:2: warning: Access to field 'hwdesc' results in a dereference of a null pointer (loaded from variable 'prev') [clang-analyzer-core.NullDereference]
prev->hwdesc->next = 0;
^
drivers/dma/nbpfaxi.c:1020:2: note: Taking false branch
dev_dbg(dchan->device->dev, "Entry %s()\n", __func__);
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/dma/nbpfaxi.c:1024:2: note: Control jumps to 'case DMA_DEV_TO_MEM:' at line 1030
switch (direction) {
^
drivers/dma/nbpfaxi.c:1032:10: note: Calling 'nbpf_prep_sg'
return nbpf_prep_sg(chan, &slave_sg, sgl, sg_len,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:932:2: note: Control jumps to 'case DMA_DEV_TO_MEM:' at line 933
switch (direction) {
^
drivers/dma/nbpfaxi.c:937:3: note: Execution continues on line 952
break;
^
drivers/dma/nbpfaxi.c:952:9: note: Calling 'nbpf_desc_get'
desc = nbpf_desc_get(chan, len);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:786:33: note: 'prev' initialized to a null pointer value
struct nbpf_link_desc *ldesc, *prev = NULL;
^~~~
drivers/dma/nbpfaxi.c:795:7: note: Assuming the condition is false
if (list_empty(&chan->free)) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:795:3: note: Taking false branch
if (list_empty(&chan->free)) {
^
drivers/dma/nbpfaxi.c:808:8: note: Assuming the condition is true
if (list_empty(&chan->free_links)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:808:4: note: Taking true branch
if (list_empty(&chan->free_links)) {
^
drivers/dma/nbpfaxi.c:812:9: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/dma/nbpfaxi.c:812:5: note: Taking false branch
if (ret < 0) {
^
drivers/dma/nbpfaxi.c:817:5: note: Execution continues on line 830
continue;
^
drivers/dma/nbpfaxi.c:830:12: note: Assuming 'i' is >= 'len'
} while (i < len);
^~~~~~~
drivers/dma/nbpfaxi.c:807:3: note: Loop condition is false. Exiting loop
do {
^
drivers/dma/nbpfaxi.c:831:12: note: 'desc' is non-null
} while (!desc);
^~~~
drivers/dma/nbpfaxi.c:792:2: note: Loop condition is false. Exiting loop
do {
^
drivers/dma/nbpfaxi.c:833:2: note: Access to field 'hwdesc' results in a dereference of a null pointer (loaded from variable 'prev')
prev->hwdesc->next = 0;
^~~~
>> drivers/dma/nbpfaxi.c:1261:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(chan->name, sizeof(chan->name), "nbpf %d", n);
^~~~~~~~
drivers/dma/nbpfaxi.c:1261:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(chan->name, sizeof(chan->name), "nbpf %d", n);
^~~~~~~~
drivers/dma/nbpfaxi.c:1374:15: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
chan->irq = irqbuf[i];
^ ~~~~~~~~~
drivers/dma/nbpfaxi.c:1304:2: note: Taking false branch
BUILD_BUG_ON(sizeof(struct nbpf_desc_page) > PAGE_SIZE);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
drivers/dma/nbpfaxi.c:1304:2: note: Loop condition is false. Exiting loop
BUILD_BUG_ON(sizeof(struct nbpf_desc_page) > PAGE_SIZE);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
drivers/dma/nbpfaxi.c:1307:6: note: Assuming 'np' is non-null
if (!np)
^~~
drivers/dma/nbpfaxi.c:1307:2: note: Taking false branch
if (!np)
^
drivers/dma/nbpfaxi.c:1315:6: note: Assuming 'nbpf' is non-null
if (!nbpf)
^~~~~
drivers/dma/nbpfaxi.c:1315:2: note: Taking false branch
if (!nbpf)
^
drivers/dma/nbpfaxi.c:1323:6: note: Calling 'IS_ERR'
if (IS_ERR(nbpf->base))
^~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:1323:6: note: Returning from 'IS_ERR'
if (IS_ERR(nbpf->base))
^~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:1323:2: note: Taking false branch
if (IS_ERR(nbpf->base))
^
drivers/dma/nbpfaxi.c:1327:6: note: Calling 'IS_ERR'
if (IS_ERR(nbpf->clk))
^~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:1327:6: note: Returning from 'IS_ERR'
if (IS_ERR(nbpf->clk))
^~~~~~~~~~~~~~~~~
drivers/dma/nbpfaxi.c:1327:2: note: Taking false branch
if (IS_ERR(nbpf->clk))
^
drivers/dma/nbpfaxi.c:1337:2: note: Loop condition is true. Entering loop body
for (i = 0; irqs < ARRAY_SIZE(irqbuf); i++) {
--
33 warnings generated.
crypto/ecdh.c:40:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->private_key, params.key, params.key_size);
^~~~~~
crypto/ecdh.c:40:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->private_key, params.key, params.key_size);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
drivers/virtio/virtio_mmio.c:168:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &b, sizeof b);
^~~~~~
drivers/virtio/virtio_mmio.c:168:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &b, sizeof b);
^~~~~~
drivers/virtio/virtio_mmio.c:172:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &w, sizeof w);
^~~~~~
drivers/virtio/virtio_mmio.c:172:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &w, sizeof w);
^~~~~~
drivers/virtio/virtio_mmio.c:176:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:176:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:180:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:180:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:182:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + sizeof l, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:182:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + sizeof l, &l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:210:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&b, buf, sizeof b);
^~~~~~
drivers/virtio/virtio_mmio.c:210:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&b, buf, sizeof b);
^~~~~~
drivers/virtio/virtio_mmio.c:214:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&w, buf, sizeof w);
^~~~~~
drivers/virtio/virtio_mmio.c:214:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&w, buf, sizeof w);
^~~~~~
drivers/virtio/virtio_mmio.c:218:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&l, buf, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:218:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&l, buf, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:222:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&l, buf, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:222:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&l, buf, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:224:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&l, buf + sizeof l, sizeof l);
^~~~~~
drivers/virtio/virtio_mmio.c:224:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&l, buf + sizeof l, sizeof l);
^~~~~~
>> drivers/virtio/virtio_mmio.c:669:14: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
processed = sscanf(str, "@%lli:%u%n:%d%n",
^~~~~~
drivers/virtio/virtio_mmio.c:669:14: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
processed = sscanf(str, "@%lli:%u%n:%d%n",
^~~~~~
>> drivers/virtio/virtio_mmio.c:716:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buffer + len, PAGE_SIZE - len, "0x%llx(a)0x%llx:%llu:%d\n",
^~~~~~~~
drivers/virtio/virtio_mmio.c:716:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buffer + len, PAGE_SIZE - len, "0x%llx(a)0x%llx:%llu:%d\n",
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/xfs/xfs_bmap_item.c:579:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:579:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buip->bui_format.bui_extents, extp, count * sizeof(*extp));
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
fs/xfs/xfs_bmap_item.c:613:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_bui_fmt, src_bui_fmt, len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/xfs/xfs_buf_item_recover.c:505:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xfs_buf_offset(bp,
^~~~~~
fs/xfs/xfs_buf_item_recover.c:505:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(xfs_buf_offset(bp,
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/xfs/xfs_dquot_item_recover.c:148:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
fs/xfs/xfs_dquot_item_recover.c:148:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ddq, recddq, item->ri_buf[1].i_len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
lib/lz4/lz4hc_compress.c:63:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:63:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:573:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:573:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:750:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
lib/lz4/lz4hc_compress.c:750:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
lib/lz4/lz4_decompress.c:156:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:156:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
--
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/as3711.c:149:6: note: Returning from 'IS_ERR'
if (IS_ERR(as3711->regmap)) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/as3711.c:149:2: note: Taking false branch
if (IS_ERR(as3711->regmap)) {
^
drivers/mfd/as3711.c:157:6: note: Assuming 'ret' is not equal to 0
if (!ret)
^~~~
drivers/mfd/as3711.c:157:2: note: Taking false branch
if (!ret)
^
drivers/mfd/as3711.c:159:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/mfd/as3711.c:159:2: note: Taking false branch
if (ret < 0) {
^
drivers/mfd/as3711.c:163:6: note: Assuming 'id1' is equal to 139
if (id1 != 0x8b)
^~~~~~~~~~~
drivers/mfd/as3711.c:163:2: note: Taking false branch
if (id1 != 0x8b)
^
drivers/mfd/as3711.c:165:2: note: Loop condition is false. Exiting loop
dev_info(as3711->dev, "AS3711 detected: %x:%x\n", id1, id2);
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/mfd/as3711.c:165:2: note: 4th function call argument is an uninitialized value
dev_info(as3711->dev, "AS3711 detected: %x:%x\n", id1, id2);
^
include/linux/dev_printk.h:150:24: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^ ~~~~~~~~~~~
include/linux/dev_printk.h:110:3: note: expanded from macro 'dev_printk_index_wrap'
_p_func(dev, fmt, ##__VA_ARGS__); \
^ ~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
drivers/char/hw_random/cctrng.c:136:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
drivers/char/hw_random/cctrng.c:136:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
drivers/char/hw_random/cctrng.c:165:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
drivers/char/hw_random/cctrng.c:165:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
drivers/char/hw_random/cctrng.c:232:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &(buf[drvdata->circ.tail]), size);
^~~~~~
drivers/char/hw_random/cctrng.c:232:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &(buf[drvdata->circ.tail]), size);
^~~~~~
drivers/char/hw_random/cctrng.c:241:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &(buf[drvdata->circ.tail]), size);
^~~~~~
drivers/char/hw_random/cctrng.c:241:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &(buf[drvdata->circ.tail]), size);
^~~~~~
drivers/char/hw_random/cctrng.c:278:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
drivers/char/hw_random/cctrng.c:278:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &(drvdata->pdev->dev);
^~~ ~~~~~~~~~~~~~~~~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
>> drivers/char/pcmcia/synclink_cs.c:537:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:537:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:867:16: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
buf->status = data[--read_count];
^
drivers/char/pcmcia/synclink_cs.c:1163:6: note: Assuming 'debug_level' is < DEBUG_LEVEL_ISR
if (debug_level >= DEBUG_LEVEL_ISR)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1163:2: note: Taking false branch
if (debug_level >= DEBUG_LEVEL_ISR)
^
drivers/char/pcmcia/synclink_cs.c:1166:6: note: Assuming field '_locked' is not equal to 0
if (!(info->p_dev->_locked))
^~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1166:2: note: Taking false branch
if (!(info->p_dev->_locked))
^
drivers/char/pcmcia/synclink_cs.c:1173:16: note: Loop condition is false. Exiting loop
while ((gis = read_reg(info, CHA + GIS))) {
^
drivers/char/pcmcia/synclink_cs.c:322:29: note: expanded from macro 'read_reg'
#define read_reg(info, reg) inb((info)->io_base + (reg))
^
arch/arm/include/asm/io.h:262:52: note: expanded from macro 'inb'
#define inb(p) ({ __u8 __v = __raw_readb(__io(p)); __iormb(); __v; })
^
arch/arm/include/asm/io.h:169:20: note: expanded from macro '__iormb'
#define __iormb() do { } while (0)
^
drivers/char/pcmcia/synclink_cs.c:1173:2: note: Loop condition is true. Entering loop body
while ((gis = read_reg(info, CHA + GIS))) {
^
drivers/char/pcmcia/synclink_cs.c:1174:7: note: Assuming 'debug_level' is < DEBUG_LEVEL_ISR
if (debug_level >= DEBUG_LEVEL_ISR)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1174:3: note: Taking false branch
if (debug_level >= DEBUG_LEVEL_ISR)
^
drivers/char/pcmcia/synclink_cs.c:1177:8: note: Assuming the condition is false
if ((gis & 0x70) || count > 1000) {
^~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1177:7: note: Left side of '||' is false
if ((gis & 0x70) || count > 1000) {
^
drivers/char/pcmcia/synclink_cs.c:1177:23: note: 'count' is <= 1000
if ((gis & 0x70) || count > 1000) {
^~~~~
drivers/char/pcmcia/synclink_cs.c:1177:3: note: Taking false branch
if ((gis & 0x70) || count > 1000) {
^
drivers/char/pcmcia/synclink_cs.c:1183:7: note: Assuming the condition is false
if (gis & (BIT1 | BIT0)) {
^~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1183:3: note: Taking false branch
if (gis & (BIT1 | BIT0)) {
^
drivers/char/pcmcia/synclink_cs.c:1190:7: note: Assuming the condition is true
if (gis & (BIT3 | BIT2))
^~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1190:3: note: Taking true branch
if (gis & (BIT3 | BIT2))
^
drivers/char/pcmcia/synclink_cs.c:1192:10: note: Loop condition is false. Exiting loop
isr = read_reg16(info, CHA + ISR);
^
drivers/char/pcmcia/synclink_cs.c:324:31: note: expanded from macro 'read_reg16'
#define read_reg16(info, reg) inw((info)->io_base + (reg))
^
arch/arm/include/asm/io.h:264:27: note: expanded from macro 'inw'
__raw_readw(__io(p))); __iormb(); __v; })
^
arch/arm/include/asm/io.h:169:20: note: expanded from macro '__iormb'
#define __iormb() do { } while (0)
^
drivers/char/pcmcia/synclink_cs.c:1193:8: note: Assuming the condition is false
if (isr & IRQ_TIMER) {
^~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1193:4: note: Taking false branch
if (isr & IRQ_TIMER) {
^
drivers/char/pcmcia/synclink_cs.c:1199:8: note: Assuming the condition is false
if (isr & IRQ_EXITHUNT) {
^~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1199:4: note: Taking false branch
if (isr & IRQ_EXITHUNT) {
^
drivers/char/pcmcia/synclink_cs.c:1203:8: note: Assuming the condition is false
if (isr & IRQ_BREAK_ON) {
^~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1203:4: note: Taking false branch
if (isr & IRQ_BREAK_ON) {
^
drivers/char/pcmcia/synclink_cs.c:1208:4: note: Taking false branch
if (isr & IRQ_RXTIME) {
^
drivers/char/pcmcia/synclink_cs.c:1211:8: note: Assuming the condition is true
if (isr & (IRQ_RXEOM | IRQ_RXFIFO)) {
--
^~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1199:4: note: Taking false branch
if (isr & IRQ_EXITHUNT) {
^
drivers/char/pcmcia/synclink_cs.c:1203:8: note: Assuming the condition is false
if (isr & IRQ_BREAK_ON) {
^~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1203:4: note: Taking false branch
if (isr & IRQ_BREAK_ON) {
^
drivers/char/pcmcia/synclink_cs.c:1208:4: note: Taking false branch
if (isr & IRQ_RXTIME) {
^
drivers/char/pcmcia/synclink_cs.c:1211:8: note: Assuming the condition is true
if (isr & (IRQ_RXEOM | IRQ_RXFIFO)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1211:4: note: Taking true branch
if (isr & (IRQ_RXEOM | IRQ_RXFIFO)) {
^
drivers/char/pcmcia/synclink_cs.c:1212:9: note: Assuming field 'mode' is equal to MGSL_MODE_HDLC
if (info->params.mode == MGSL_MODE_HDLC)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:1212:5: note: Taking true branch
if (info->params.mode == MGSL_MODE_HDLC)
^
drivers/char/pcmcia/synclink_cs.c:1213:6: note: Calling 'rx_ready_hdlc'
rx_ready_hdlc(info, isr & IRQ_RXEOM);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:834:6: note: 'debug_level' is < DEBUG_LEVEL_ISR
if (debug_level >= DEBUG_LEVEL_ISR)
^~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:834:2: note: Taking false branch
if (debug_level >= DEBUG_LEVEL_ISR)
^
drivers/char/pcmcia/synclink_cs.c:837:6: note: Assuming field 'rx_enabled' is true
if (!info->rx_enabled)
^~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:837:2: note: Taking false branch
if (!info->rx_enabled)
^
drivers/char/pcmcia/synclink_cs.c:840:6: note: Assuming field 'rx_frame_count' is < field 'rx_buf_count'
if (info->rx_frame_count >= info->rx_buf_count) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:840:2: note: Taking false branch
if (info->rx_frame_count >= info->rx_buf_count) {
^
drivers/char/pcmcia/synclink_cs.c:849:6: note: Assuming 'eom' is 0
if (eom) {
^~~
drivers/char/pcmcia/synclink_cs.c:849:2: note: Taking false branch
if (eom) {
^
drivers/char/pcmcia/synclink_cs.c:858:7: note: 'fifo_count' is not equal to 1
if (fifo_count == 1) {
^~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:858:3: note: Taking false branch
if (fifo_count == 1) {
^
drivers/char/pcmcia/synclink_cs.c:863:33: note: Loop condition is false. Exiting loop
*((unsigned short *) data) = read_reg16(info, CHA + RXFIFO);
^
drivers/char/pcmcia/synclink_cs.c:324:31: note: expanded from macro 'read_reg16'
#define read_reg16(info, reg) inw((info)->io_base + (reg))
^
arch/arm/include/asm/io.h:264:27: note: expanded from macro 'inw'
__raw_readw(__io(p))); __iormb(); __v; })
^
arch/arm/include/asm/io.h:169:20: note: expanded from macro '__iormb'
#define __iormb() do { } while (0)
^
drivers/char/pcmcia/synclink_cs.c:866:8: note: 'fifo_count' is 30
if (!fifo_count && eom)
^~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:866:19: note: Left side of '&&' is false
if (!fifo_count && eom)
^
drivers/char/pcmcia/synclink_cs.c:869:3: note: Loop condition is true. Entering loop body
for (i = 0; i < read_count; i++) {
^
drivers/char/pcmcia/synclink_cs.c:870:8: note: Assuming field 'count' is < field 'max_frame_size'
if (buf->count >= info->max_frame_size) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:870:4: note: Taking false branch
if (buf->count >= info->max_frame_size) {
^
drivers/char/pcmcia/synclink_cs.c:869:31: note: The value 1 is assigned to 'i'
for (i = 0; i < read_count; i++) {
^~~
drivers/char/pcmcia/synclink_cs.c:869:3: note: Loop condition is true. Entering loop body
for (i = 0; i < read_count; i++) {
^
drivers/char/pcmcia/synclink_cs.c:870:8: note: Assuming field 'count' is < field 'max_frame_size'
if (buf->count >= info->max_frame_size) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/pcmcia/synclink_cs.c:870:4: note: Taking false branch
if (buf->count >= info->max_frame_size) {
^
drivers/char/pcmcia/synclink_cs.c:876:30: note: Assigned value is garbage or undefined
*(buf->data + buf->count) = data[i];
^ ~~~~~~~
>> drivers/char/pcmcia/synclink_cs.c:1288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1579:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(info->tx_buf + info->tx_put, buf, c);
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1579:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(info->tx_buf + info->tx_put, buf, c);
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1766:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1766:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1815:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params,&tmp_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:1815:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params,&tmp_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2544:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RTS");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2544:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RTS");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2546:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CTS");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2546:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CTS");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2548:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DTR");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2548:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DTR");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2550:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DSR");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2550:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DSR");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2552:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CD");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2552:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CD");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2554:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RI");
^~~~~~
drivers/char/pcmcia/synclink_cs.c:2554:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RI");
^~~~~~
>> drivers/char/pcmcia/synclink_cs.c:2677:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->device_name,"ttySLP%d",info->line);
^~~~~~~
drivers/char/pcmcia/synclink_cs.c:2677:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->device_name,"ttySLP%d",info->line);
^~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/regulator/mc13892-regulator.c:583:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mc13892_vcam_ops, mc13892_regulators[MC13892_VCAM].desc.ops,
^~~~~~
drivers/regulator/mc13892-regulator.c:583:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mc13892_vcam_ops, mc13892_regulators[MC13892_VCAM].desc.ops,
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/regulator/mp886x.c:134:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/mp886x.c:123:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/regulator/mp886x.c:123:2: note: Taking false branch
if (ret)
^
drivers/regulator/mp886x.c:127:6: note: Assuming 'fbloop' is false
if (fbloop) {
^~~~~~
drivers/regulator/mp886x.c:127:2: note: Taking false branch
if (fbloop) {
^
drivers/regulator/mp886x.c:134:6: note: Assigned value is garbage or undefined
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/mp886x.c:207:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/mp886x.c:201:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/regulator/mp886x.c:201:2: note: Taking false branch
if (ret)
^
drivers/regulator/mp886x.c:207:6: note: Assigned value is garbage or undefined
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/fs-writeback.c:148:3: warning: Argument to kfree() is the address of the local variable 'work', which is not memory allocated by malloc() [clang-analyzer-unix.Malloc]
kfree(work);
^
fs/fs-writeback.c:2702:6: note: Assuming the condition is false
if (bdi == &noop_backing_dev_info)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:2702:2: note: Taking false branch
if (bdi == &noop_backing_dev_info)
^
fs/fs-writeback.c:2704:2: note: Taking false branch
WARN_ON(!rwsem_is_locked(&sb->s_umount));
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
fs/fs-writeback.c:2708:2: note: Calling 'bdi_split_work_to_wbs'
bdi_split_work_to_wbs(bdi, &work, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:29: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
include/linux/kernel.h:115:26: note: expanded from macro 'might_resched'
# define might_resched() do { } while (0)
^
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:24: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
fs/fs-writeback.c:1206:7: note: 'skip_if_busy' is false
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
^~~~~~~~~~~~
fs/fs-writeback.c:1206:20: note: Left side of '||' is true
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
--
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
lib/rhashtable.c:792:21: warning: Value stored to 'p' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:792:21: note: Value stored to 'p' during its initialization is never read
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:1025:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1025:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1028:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
lib/rhashtable.c:1028:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/dma/sh/shdma-base.c:334:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cb, 0, sizeof(cb));
^~~~~~
drivers/dma/sh/shdma-base.c:334:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cb, 0, sizeof(cb));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/tty/serial/8250/8250_tegra.c:54:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port8250, 0, sizeof(port8250));
^~~~~~
drivers/tty/serial/8250/8250_tegra.c:54:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port8250, 0, sizeof(port8250));
^~~~~~
Suppressed 33 warnings (32 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/tty/serial/8250/8250_of.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port, 0, sizeof *port);
^~~~~~
drivers/tty/serial/8250/8250_of.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port, 0, sizeof *port);
^~~~~~
drivers/tty/serial/8250/8250_of.c:219:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port8250, 0, sizeof(port8250));
^~~~~~
drivers/tty/serial/8250/8250_of.c:219:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port8250, 0, sizeof(port8250));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> drivers/tty/serial/amba-pl011.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dmatx->buf[0], &xmit->buf[xmit->tail], count);
^~~~~~
drivers/tty/serial/amba-pl011.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dmatx->buf[0], &xmit->buf[xmit->tail], count);
^~~~~~
drivers/tty/serial/amba-pl011.c:608:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dmatx->buf[0], &xmit->buf[xmit->tail], first);
^~~~~~
drivers/tty/serial/amba-pl011.c:608:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dmatx->buf[0], &xmit->buf[xmit->tail], first);
^~~~~~
drivers/tty/serial/amba-pl011.c:610:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dmatx->buf[first], &xmit->buf[0], second);
^~~~~~
drivers/tty/serial/amba-pl011.c:610:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dmatx->buf[first], &xmit->buf[0], second);
^~~~~~
drivers/tty/serial/amba-pl011.c:908:3: warning: Value stored to 'fifotaken' is never read [clang-analyzer-deadcode.DeadStores]
fifotaken = pl011_fifo_to_tty(uap);
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/serial/amba-pl011.c:908:3: note: Value stored to 'fifotaken' is never read
fifotaken = pl011_fifo_to_tty(uap);
^ ~~~~~~~~~~~~~~~~~~~~~~
>> drivers/tty/serial/amba-pl011.c:2182:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
drivers/tty/serial/amba-pl011.c:2182:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
>> drivers/tty/serial/amba-pl011.c:2761:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(uap->type, sizeof(uap->type), "PL011 rev%u", amba_rev(dev));
^~~~~~~~
drivers/tty/serial/amba-pl011.c:2761:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(uap->type, sizeof(uap->type), "PL011 rev%u", amba_rev(dev));
^~~~~~~~
drivers/tty/serial/amba-pl011.c:2853:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(uap->type, sizeof(uap->type), "SBSA");
^~~~~~~~
drivers/tty/serial/amba-pl011.c:2853:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(uap->type, sizeof(uap->type), "SBSA");
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
block/bfq-iosched.c:7185:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", var);
^~~~~~~
block/bfq-iosched.c:7185:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", var);
^~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
block/bfq-wf2q.c:263:7: warning: Access to field 'my_sched_data' results in a dereference of a null pointer (loaded from variable 'entity') [clang-analyzer-core.NullDereference]
if (!entity->my_sched_data)
^
block/bfq-wf2q.c:1508:2: note: 'entity' initialized to a null pointer value
struct bfq_entity *entity = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:6: note: Assuming the condition is false
if (bfq_tot_busy_queues(bfqd) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:2: note: Taking false branch
if (bfq_tot_busy_queues(bfqd) == 0)
^
block/bfq-wf2q.c:1521:2: note: Loop condition is false. Execution continues on line 1582
for (; sd ; sd = entity->my_sched_data) {
^
block/bfq-wf2q.c:1582:28: note: Passing null pointer value via 1st parameter 'entity'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~
block/bfq-wf2q.c:1582:9: note: Calling 'bfq_entity_to_bfqq'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:263:7: note: Access to field 'my_sched_data' results in a dereference of a null pointer (loaded from variable 'entity')
if (!entity->my_sched_data)
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (49 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/virtio/virtio_balloon.c:266:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
list_for_each_entry_safe(page, next, pages, lru) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^
include/linux/container_of.h:18:2: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^
drivers/virtio/virtio_balloon.c:1104:2: note: Calling 'remove_common'
remove_common(vb);
^~~~~~~~~~~~~~~~~
drivers/virtio/virtio_balloon.c:1050:2: note: Loop condition is true. Entering loop body
while (vb->num_pages)
^
drivers/virtio/virtio_balloon.c:1051:3: note: Calling 'leak_balloon'
leak_balloon(vb, vb->num_pages);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/virtio/virtio_balloon.c:283:8: note: Assuming '__UNIQUE_ID___x273' is >= '__UNIQUE_ID___y274'
num = min(num, ARRAY_SIZE(vb->pfns));
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/virtio/virtio_balloon.c:283:8: note: '?' condition is false
num = min(num, ARRAY_SIZE(vb->pfns));
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/virtio/virtio_balloon.c:287:8: note: Assuming '__UNIQUE_ID___x275' is >= '__UNIQUE_ID___y276'
num = min(num, (size_t)vb->num_pages);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/virtio/virtio_balloon.c:287:8: note: '?' condition is false
num = min(num, (size_t)vb->num_pages);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/virtio/virtio_balloon.c:288:25: note: Assuming 'num' is <= field 'num_pfns'
for (vb->num_pfns = 0; vb->num_pfns < num;
^~~~~~~~~~~~~~~~~~
drivers/virtio/virtio_balloon.c:288:2: note: Loop condition is false. Execution continues on line 298
for (vb->num_pfns = 0; vb->num_pfns < num;
^
drivers/virtio/virtio_balloon.c:304:10: note: Field 'num_pfns' is equal to 0
if (vb->num_pfns != 0)
^
drivers/virtio/virtio_balloon.c:304:2: note: Taking false branch
if (vb->num_pfns != 0)
^
drivers/virtio/virtio_balloon.c:306:2: note: Calling 'release_pages_balloon'
release_pages_balloon(vb, &pages);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/virtio/virtio_balloon.c:266:2: note: Assigned value is garbage or undefined
list_for_each_entry_safe(page, next, pages, lru) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:2: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^ ~~~~~~~~~~~~~
>> drivers/virtio/virtio_balloon.c:980:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&poison_val, PAGE_POISON, sizeof(poison_val));
^~~~~~
drivers/virtio/virtio_balloon.c:980:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&poison_val, PAGE_POISON, sizeof(poison_val));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
arch/arm/include/asm/uaccess.h:580:2: warning: Null pointer passed as 1st argument to memory copy function [clang-analyzer-unix.cstring.NullArg]
memcpy(to, (const void __force *)from, n);
^
drivers/mtd/mtdchar.c:697:2: note: Taking false branch
pr_debug("MTD_ioctl\n");
^
include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
drivers/mtd/mtdchar.c:703:2: note: Control jumps to 'case 3224390936:' at line 731
switch (cmd) {
^
drivers/mtd/mtdchar.c:734:7: note: Assuming the condition is false
if (!(file->f_mode & FMODE_WRITE))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/mtdchar.c:734:3: note: Taking false branch
if (!(file->f_mode & FMODE_WRITE))
^
drivers/mtd/mtdchar.c:736:3: note: Execution continues on line 742
break;
^
drivers/mtd/mtdchar.c:742:2: note: Control jumps to 'case 3224390936:' at line 877
switch (cmd) {
^
drivers/mtd/mtdchar.c:879:9: note: Calling 'mtdchar_write_ioctl'
ret = mtdchar_write_ioctl(mtd,
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/mtdchar.c:599:11: note: 'datbuf' initialized to a null pointer value
uint8_t *datbuf = NULL, *oobbuf = NULL;
^~~~~~
drivers/mtd/mtdchar.c:603:6: note: Calling 'copy_from_user'
if (copy_from_user(&req, argp, sizeof(req)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Assuming the condition is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/include/asm/uaccess.h:581:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning zero (loaded from 'res'), which participates in a condition later
return res;
^~~~~~~~~~
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning zero (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
drivers/mtd/mtdchar.c:603:6: note: Returning from 'copy_from_user'
if (copy_from_user(&req, argp, sizeof(req)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/mtdchar.c:603:2: note: Taking false branch
if (copy_from_user(&req, argp, sizeof(req)))
^
drivers/mtd/mtdchar.c:609:6: note: Assuming field '_write_oob' is non-null
if (!master->_write_oob)
^~~~~~~~~~~~~~~~~~~
drivers/mtd/mtdchar.c:609:2: note: Taking false branch
if (!master->_write_oob)
^
drivers/mtd/mtdchar.c:612:6: note: Assuming 'usr_data' is non-null
if (!usr_data)
^~~~~~~~~
drivers/mtd/mtdchar.c:612:2: note: Taking false branch
if (!usr_data)
^
drivers/mtd/mtdchar.c:615:6: note: Assuming 'usr_oob' is null
if (!usr_oob)
^~~~~~~~
drivers/mtd/mtdchar.c:615:2: note: Taking true branch
--
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/dma/sf-pdma/sf-pdma.c:57:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&chan->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/dma/sf-pdma/sf-pdma.c:59:6: note: Access to field 'desc' results in a dereference of a null pointer (loaded from variable 'chan')
if (chan->desc && !chan->desc->in_use) {
^~~~
drivers/dma/sf-pdma/sf-pdma.c:126:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&chan->cfg, cfg, sizeof(*cfg));
^~~~~~
drivers/dma/sf-pdma/sf-pdma.c:126:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chan->cfg, cfg, sizeof(*cfg));
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/dma/s3c24xx-dma.c:322:20: warning: Access to field 'clk' results in a dereference of a null pointer (loaded from variable 'phy') [clang-analyzer-core.NullDereference]
ret = clk_enable(phy->clk);
^
drivers/dma/s3c24xx-dma.c:1072:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&s3cchan->vc.lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/dma/s3c24xx-dma.c:1072:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&s3cchan->vc.lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/dma/s3c24xx-dma.c:1073:6: note: Assuming the condition is true
if (vchan_issue_pending(&s3cchan->vc)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:1073:2: note: Taking true branch
if (vchan_issue_pending(&s3cchan->vc)) {
^
drivers/dma/s3c24xx-dma.c:1074:7: note: Assuming field 'phy' is null
if (!s3cchan->phy && s3cchan->state != S3C24XX_DMA_CHAN_WAITING)
^~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:1074:7: note: Left side of '&&' is true
drivers/dma/s3c24xx-dma.c:1074:24: note: Assuming field 'state' is not equal to S3C24XX_DMA_CHAN_WAITING
if (!s3cchan->phy && s3cchan->state != S3C24XX_DMA_CHAN_WAITING)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:1074:3: note: Taking true branch
if (!s3cchan->phy && s3cchan->state != S3C24XX_DMA_CHAN_WAITING)
^
drivers/dma/s3c24xx-dma.c:1075:4: note: Calling 's3c24xx_dma_phy_alloc_and_start'
s3c24xx_dma_phy_alloc_and_start(s3cchan);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:532:8: note: Calling 's3c24xx_dma_get_phy'
phy = s3c24xx_dma_get_phy(s3cchan);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:289:2: note: 'phy' initialized to a null pointer value
struct s3c24xx_dma_phy *phy = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:294:14: note: Assuming 'i' is >= field 'num_phy_channels'
for (i = 0; i < s3cdma->pdata->num_phy_channels; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:294:2: note: Loop condition is false. Execution continues on line 315
for (i = 0; i < s3cdma->pdata->num_phy_channels; i++) {
^
drivers/dma/s3c24xx-dma.c:315:6: note: Assuming 'i' is not equal to field 'num_phy_channels'
if (i == s3cdma->pdata->num_phy_channels) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:315:2: note: Taking false branch
if (i == s3cdma->pdata->num_phy_channels) {
^
drivers/dma/s3c24xx-dma.c:321:6: note: Assuming field 'has_clocks' is true
if (s3cdma->sdata->has_clocks) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:321:2: note: Taking true branch
if (s3cdma->sdata->has_clocks) {
^
drivers/dma/s3c24xx-dma.c:322:20: note: Access to field 'clk' results in a dereference of a null pointer (loaded from variable 'phy')
ret = clk_enable(phy->clk);
^~~
drivers/dma/s3c24xx-dma.c:529:29: warning: Value stored to 's3cdma' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct s3c24xx_dma_engine *s3cdma = s3cchan->host;
^~~~~~ ~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:529:29: note: Value stored to 's3cdma' during its initialization is never read
struct s3c24xx_dma_engine *s3cdma = s3cchan->host;
^~~~~~ ~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:552:29: warning: Value stored to 's3cdma' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct s3c24xx_dma_engine *s3cdma = s3cchan->host;
^~~~~~ ~~~~~~~~~~~~~
drivers/dma/s3c24xx-dma.c:552:29: note: Value stored to 's3cdma' during its initialization is never read
struct s3c24xx_dma_engine *s3cdma = s3cchan->host;
^~~~~~ ~~~~~~~~~~~~~
>> drivers/dma/s3c24xx-dma.c:1252:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(clk_name, "dma.%d", i);
^~~~~~~
drivers/dma/s3c24xx-dma.c:1252:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(clk_name, "dma.%d", i);
^~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/input/keyboard/lm8323.c:333:3: warning: Value stored to 'active' is never read [clang-analyzer-deadcode.DeadStores]
active = debounce + 3;
^ ~~~~~~~~~~~~
drivers/input/keyboard/lm8323.c:333:3: note: Value stored to 'active' is never read
active = debounce + 3;
^ ~~~~~~~~~~~~
drivers/input/keyboard/lm8323.c:528:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pwm->fade_time);
^~~~~~~
drivers/input/keyboard/lm8323.c:528:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pwm->fade_time);
^~~~~~~
drivers/input/keyboard/lm8323.c:595:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", !lm->kp_enabled);
^~~~~~~
drivers/input/keyboard/lm8323.c:595:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", !lm->kp_enabled);
^~~~~~~
drivers/input/keyboard/lm8323.c:705:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(lm->phys, sizeof(lm->phys),
^~~~~~~~
drivers/input/keyboard/lm8323.c:705:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(lm->phys, sizeof(lm->phys),
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/mfd/si476x-i2c.c:717:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&core->power_up_parameters,
^~~~~~
drivers/mfd/si476x-i2c.c:717:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&core->power_up_parameters,
^~~~~~
drivers/mfd/si476x-i2c.c:734:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&core->pinmux, &pdata->pinmux,
^~~~~~
drivers/mfd/si476x-i2c.c:734:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&core->pinmux, &pdata->pinmux,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
drivers/mfd/qcom-pm8xxx.c:549:2: warning: Value stored to 'rev' is never read [clang-analyzer-deadcode.DeadStores]
rev |= val << BITS_PER_BYTE;
^ ~~~~~~~~~~~~~~~~~~~~
drivers/mfd/qcom-pm8xxx.c:549:2: note: Value stored to 'rev' is never read
rev |= val << BITS_PER_BYTE;
^ ~~~~~~~~~~~~~~~~~~~~
Suppressed 18 warnings (17 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/mfd/aat2870-core.c:222:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += sprintf(buf, "aat2870 registers\n");
^~~~~~~
drivers/mfd/aat2870-core.c:222:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count += sprintf(buf, "aat2870 registers\n");
^~~~~~~
drivers/mfd/aat2870-core.c:224:12: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count, PAGE_SIZE - count, "0x%02x: ", addr);
^~~~~~~~
drivers/mfd/aat2870-core.c:224:12: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count, PAGE_SIZE - count, "0x%02x: ", addr);
^~~~~~~~
drivers/mfd/aat2870-core.c:230:13: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count, PAGE_SIZE - count,
^~~~~~~~
drivers/mfd/aat2870-core.c:230:13: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count, PAGE_SIZE - count,
^~~~~~~~
drivers/mfd/aat2870-core.c:233:13: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count, PAGE_SIZE - count,
^~~~~~~~
drivers/mfd/aat2870-core.c:233:13: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count, PAGE_SIZE - count,
^~~~~~~~
drivers/mfd/aat2870-core.c:239:12: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count, PAGE_SIZE - count, "\n");
^~~~~~~~
drivers/mfd/aat2870-core.c:239:12: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count, PAGE_SIZE - count, "\n");
^~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
lib/zstd/compress/zstd_compress_sequences.c:260:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextCTable, prevCTable, prevCTableSize);
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:256:16: note: Assuming 'row' is < field 'num_rows'
for (row = 0; row < kp->num_rows; row++) {
^~~~~~~~~~~~~~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:256:2: note: Loop condition is true. Entering loop body
for (row = 0; row < kp->num_rows; row++) {
^
drivers/input/keyboard/pmic8xxx-keypad.c:257:33: note: The left operand of '&' is a garbage value
row_state = (~new_state[row]) &
~~~~~~~~~~~~~~~ ^
drivers/input/keyboard/pmic8xxx-keypad.c:290:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:290:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:299:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:299:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:308:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:308:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kp->keystate, new_state, sizeof(new_state));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:580:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kp->keystate, 0xff, sizeof(kp->keystate));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:580:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kp->keystate, 0xff, sizeof(kp->keystate));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:581:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kp->stuckstate, 0xff, sizeof(kp->stuckstate));
^~~~~~
drivers/input/keyboard/pmic8xxx-keypad.c:581:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kp->stuckstate, 0xff, sizeof(kp->stuckstate));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/i2c/muxes/i2c-mux-reg.c:170:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mux->data, dev_get_platdata(&pdev->dev),
^~~~~~
drivers/i2c/muxes/i2c-mux-reg.c:170:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mux->data, dev_get_platdata(&pdev->dev),
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/i2c/i2c-slave-eeprom.c:102:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &eeprom->buffer[off], count);
^~~~~~
drivers/i2c/i2c-slave-eeprom.c:102:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &eeprom->buffer[off], count);
^~~~~~
drivers/i2c/i2c-slave-eeprom.c:117:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&eeprom->buffer[off], buf, count);
^~~~~~
drivers/i2c/i2c-slave-eeprom.c:117:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&eeprom->buffer[off], buf, count);
^~~~~~
drivers/i2c/i2c-slave-eeprom.c:138:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(eeprom->buffer, 0xff, size);
^~~~~~
drivers/i2c/i2c-slave-eeprom.c:138:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(eeprom->buffer, 0xff, size);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
drivers/misc/echo/echo.c:247:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ec->fir_taps16[i], 0, ec->taps * sizeof(int16_t));
^~~~~~
drivers/misc/echo/echo.c:247:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ec->fir_taps16[i], 0, ec->taps * sizeof(int16_t));
^~~~~~
drivers/misc/echo/echo.c:256:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ec->snapshot, ec->fir_taps16[0], ec->taps * sizeof(int16_t));
^~~~~~
drivers/misc/echo/echo.c:256:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ec->snapshot, ec->fir_taps16[0], ec->taps * sizeof(int16_t));
^~~~~~
drivers/misc/echo/echo.c:442:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ec->fir_taps16[0], ec->fir_taps16[1],
^~~~~~
drivers/misc/echo/echo.c:442:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ec->fir_taps16[0], ec->fir_taps16[1],
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/media/dvb-frontends/dib9000.c:242:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:242:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:330:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state->msg[0], 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:330:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state->msg[0], 0, sizeof(struct i2c_msg));
^~~~~~
>> drivers/media/dvb-frontends/dib9000.c:347:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->i2c_write_buffer[2], buf, l);
^~~~~~
drivers/media/dvb-frontends/dib9000.c:347:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->i2c_write_buffer[2], buf, l);
^~~~~~
drivers/media/dvb-frontends/dib9000.c:741:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg, block + 1, (*size) * 2);
^~~~~~
drivers/media/dvb-frontends/dib9000.c:741:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg, block + 1, (*size) * 2);
^~~~~~
drivers/media/dvb-frontends/dib9000.c:1988:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->channel_status, channel_status, sizeof(struct dvb_frontend_parametersContext));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:1988:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->channel_status, channel_status, sizeof(struct dvb_frontend_parametersContext));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2034:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->fe[index_frontend]->dtv_property_cache, &fe->dtv_property_cache, sizeof(struct dtv_frontend_properties));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2034:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->fe[index_frontend]->dtv_property_cache, &fe->dtv_property_cache, sizeof(struct dtv_frontend_properties));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2486:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&st->chip.d9.cfg, cfg, sizeof(struct dib9000_config));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2486:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&st->chip.d9.cfg, cfg, sizeof(struct dib9000_config));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2507:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&st->fe[0]->ops, &dib9000_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/dib9000.c:2507:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&st->fe[0]->ops, &dib9000_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/input/ff-memless.c:335:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(combo_effect, 0, sizeof(struct ff_effect));
^~~~~~
drivers/input/ff-memless.c:335:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(combo_effect, 0, sizeof(struct ff_effect));
^~~~~~
drivers/input/ff-memless.c:395:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(handled_bm, 0, sizeof(handled_bm));
^~~~~~
drivers/input/ff-memless.c:395:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(handled_bm, 0, sizeof(handled_bm));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/input/sparse-keymap.c:124:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ke->scancode, &key->code, sizeof(key->code));
^~~~~~
drivers/input/sparse-keymap.c:124:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ke->scancode, &key->code, sizeof(key->code));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
lib/fault-inject.c:26:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(str, "%lu,%lu,%d,%d",
^~~~~~
lib/fault-inject.c:26:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(str, "%lu,%lu,%d,%d",
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/i2c/cx25840/cx25840-ir.c:695:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, &ir_state->rx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:695:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, &ir_state->rx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:885:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, &ir_state->tx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:885:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, &ir_state->tx_params,
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/i2c/m5mols/m5mols_core.c:1022:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = m5mols_init_controls(sd);
--
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:922:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x0011, 0x00);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:925:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x0014, 0); /* gain error=0 */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:925:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x0014, 0); /* gain error=0 */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:928:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_read_reg(state, 0x103c, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:928:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_read_reg(state, 0x103c, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:931:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x103c, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:931:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x103c, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:934:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_read_reg(state, 0x103d, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:934:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_read_reg(state, 0x103d, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:937:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x103d, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:937:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x103d, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:940:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_read_reg(state, 0x1036, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:940:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_read_reg(state, 0x1036, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:943:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x1036, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:943:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x1036, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:946:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_read_reg(state, 0x211f, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:946:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_read_reg(state, 0x211f, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:948:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x211f, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:948:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x211f, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:951:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_read_reg(state, 0x2849, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:951:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_read_reg(state, 0x2849, &val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:953:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_write_reg(state, 0x2849, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:953:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_write_reg(state, 0x2849, val);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:956:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_set_vsb(state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:956:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_set_vsb(state);
^ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:959:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_mpeg_mode(state, state->cfg->mpeg_mode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:959:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_mpeg_mode(state, state->cfg->mpeg_mode);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:962:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = lgdt3306a_mpeg_tristate(state, 1);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:962:2: note: Value stored to 'ret' is never read
ret = lgdt3306a_mpeg_tristate(state, 1);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:996:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = fe->ops.tuner_ops.set_params(fe);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:996:3: note: Value stored to 'ret' is never read
ret = fe->ops.tuner_ops.set_params(fe);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:1183:2: warning: Value stored to 'modeOper' is never read [clang-analyzer-deadcode.DeadStores]
modeOper = LG3306_UNKNOWN_MODE;
^ ~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:1183:2: note: Value stored to 'modeOper' is never read
modeOper = LG3306_UNKNOWN_MODE;
^ ~~~~~~~~~~~~~~~~~~~
>> drivers/media/dvb-frontends/lgdt3306a.c:1812:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &lgdt3306a_ops,
^~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:1812:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &lgdt3306a_ops,
^~~~~~
>> drivers/media/dvb-frontends/lgdt3306a.c:2100:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(regval2, 0xff, sizeof(regval2));
^~~~~~
drivers/media/dvb-frontends/lgdt3306a.c:2100:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(regval2, 0xff, sizeof(regval2));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/i2c/i2c-core-base.c:645:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", dev->type == &i2c_client_type ?
^~~~~~~
drivers/i2c/i2c-core-base.c:645:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", dev->type == &i2c_client_type ?
^~~~~~~
drivers/i2c/i2c-core-base.c:664:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s%s\n", I2C_MODULE_PREFIX, client->name);
^~~~~~~
drivers/i2c/i2c-core-base.c:664:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s%s\n", I2C_MODULE_PREFIX, client->name);
^~~~~~~
drivers/i2c/i2c-core-base.c:1185:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
drivers/i2c/i2c-core-base.c:1185:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
drivers/i2c/i2c-core-base.c:1196:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(info.type, buf, blank - buf);
^~~~~~
drivers/i2c/i2c-core-base.c:1196:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(info.type, buf, blank - buf);
^~~~~~
drivers/i2c/i2c-core-base.c:1199:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
res = sscanf(++blank, "%hi%c", &info.addr, &end);
^~~~~~
drivers/i2c/i2c-core-base.c:1199:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
res = sscanf(++blank, "%hi%c", &info.addr, &end);
^~~~~~
drivers/i2c/i2c-core-base.c:1254:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
res = sscanf(buf, "%hi%c", &addr, &end);
^~~~~~
drivers/i2c/i2c-core-base.c:1254:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
res = sscanf(buf, "%hi%c", &addr, &end);
^~~~~~
drivers/i2c/i2c-core-base.c:1740:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&adap->dev, 0, sizeof(adap->dev));
^~~~~~
drivers/i2c/i2c-core-base.c:1740:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&adap->dev, 0, sizeof(adap->dev));
^~~~~~
drivers/i2c/i2c-core-base.c:2316:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
drivers/i2c/i2c-core-base.c:2316:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
drivers/i2c/i2c-core-base.c:2521:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->buf, buf, msg->len);
^~~~~~
drivers/i2c/i2c-core-base.c:2521:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->buf, buf, msg->len);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/i2c/busses/i2c-gpio.c:384:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pdata, dev_get_platdata(dev), sizeof(*pdata));
^~~~~~
drivers/i2c/busses/i2c-gpio.c:384:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pdata, dev_get_platdata(dev), sizeof(*pdata));
^~~~~~
drivers/i2c/busses/i2c-gpio.c:441:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(adap->name, sizeof(adap->name), "i2c-gpio%d", pdev->id);
^~~~~~~~
drivers/i2c/busses/i2c-gpio.c:441:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name), "i2c-gpio%d", pdev->id);
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/i2c/busses/i2c-nomadik.c:1034:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(adap->name, sizeof(adap->name),
^~~~~~~~
drivers/i2c/busses/i2c-nomadik.c:1034:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name),
--
^~~~
drivers/media/i2c/ov7670.c:1522:8: note: Calling 'ov7670_read'
ret = ov7670_read(sd, REG_COM1, &com1) +
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:565:6: note: Assuming field 'use_smbus' is true
if (info->use_smbus)
^~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:565:2: note: Taking true branch
if (info->use_smbus)
^
drivers/media/i2c/ov7670.c:566:10: note: Calling 'ov7670_read_smbus'
return ov7670_read_smbus(sd, reg, value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:485:6: note: Assuming 'ret' is < 0
if (ret >= 0) {
^~~~~~~~
drivers/media/i2c/ov7670.c:485:2: note: Taking false branch
if (ret >= 0) {
^
drivers/media/i2c/ov7670.c:489:2: note: Returning without writing to '*value'
return ret;
^
drivers/media/i2c/ov7670.c:566:10: note: Returning from 'ov7670_read_smbus'
return ov7670_read_smbus(sd, reg, value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:566:3: note: Returning without writing to '*value'
return ov7670_read_smbus(sd, reg, value);
^
drivers/media/i2c/ov7670.c:1522:8: note: Returning from 'ov7670_read'
ret = ov7670_read(sd, REG_COM1, &com1) +
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:1525:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/media/i2c/ov7670.c:1525:2: note: Taking false branch
if (ret)
^
drivers/media/i2c/ov7670.c:1528:15: note: The left operand of '&' is a garbage value
com1 = (com1 & 0xfc) | (value & 0x03);
~~~~ ^
drivers/media/i2c/ov7670.c:1530:17: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
aechh = (aechh & 0xc0) | ((value >> 10) & 0x3f);
^
drivers/media/i2c/ov7670.c:1597:2: note: Control jumps to 'case 10094849:' at line 1617
switch (ctrl->id) {
^
drivers/media/i2c/ov7670.c:1620:7: note: Assuming field 'val' is equal to V4L2_EXPOSURE_MANUAL
if (ctrl->val == V4L2_EXPOSURE_MANUAL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:1620:3: note: Taking true branch
if (ctrl->val == V4L2_EXPOSURE_MANUAL) {
^
drivers/media/i2c/ov7670.c:1622:11: note: Calling 'ov7670_s_exp'
return ov7670_s_exp(sd, info->exposure->val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:1520:34: note: 'aechh' declared without an initial value
unsigned char com1, com8, aech, aechh;
^~~~~
drivers/media/i2c/ov7670.c:1524:3: note: Calling 'ov7670_read'
ov7670_read(sd, REG_AECHH, &aechh);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:565:12: note: Field 'use_smbus' is true
if (info->use_smbus)
^
drivers/media/i2c/ov7670.c:565:2: note: Taking true branch
if (info->use_smbus)
^
drivers/media/i2c/ov7670.c:566:10: note: Calling 'ov7670_read_smbus'
return ov7670_read_smbus(sd, reg, value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:485:6: note: Assuming 'ret' is < 0
if (ret >= 0) {
^~~~~~~~
drivers/media/i2c/ov7670.c:485:2: note: Taking false branch
if (ret >= 0) {
^
drivers/media/i2c/ov7670.c:489:2: note: Returning without writing to '*value'
return ret;
^
drivers/media/i2c/ov7670.c:566:10: note: Returning from 'ov7670_read_smbus'
return ov7670_read_smbus(sd, reg, value);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:566:3: note: Returning without writing to '*value'
return ov7670_read_smbus(sd, reg, value);
^
drivers/media/i2c/ov7670.c:1524:3: note: Returning from 'ov7670_read'
ov7670_read(sd, REG_AECHH, &aechh);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov7670.c:1525:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/media/i2c/ov7670.c:1525:2: note: Taking false branch
if (ret)
^
drivers/media/i2c/ov7670.c:1530:17: note: The left operand of '&' is a garbage value
aechh = (aechh & 0xc0) | ((value >> 10) & 0x3f);
~~~~~ ^
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> drivers/tty/serial/bcm63xx_uart.c:825:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port, 0, sizeof(*port));
^~~~~~
drivers/tty/serial/bcm63xx_uart.c:825:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port, 0, sizeof(*port));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/tty/serial/samsung_tty.c:1454:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(clkname, "clk_uart_baud%d", cnt);
^~~~~~~
drivers/tty/serial/samsung_tty.c:1454:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(clkname, "clk_uart_baud%d", cnt);
^~~~~~~
drivers/tty/serial/samsung_tty.c:1994:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(clk_name, "clk_uart_baud%d", clk_num);
^~~~~~~
drivers/tty/serial/samsung_tty.c:1994:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(clk_name, "clk_uart_baud%d", clk_num);
^~~~~~~
drivers/tty/serial/samsung_tty.c:2554:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(clk_name, "clk_uart_baud%d", clk_sel);
^~~~~~~
drivers/tty/serial/samsung_tty.c:2554:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(clk_name, "clk_uart_baud%d", clk_sel);
^~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/tty/n_tty.c:165:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0x00, size);
^~~~~~
drivers/tty/n_tty.c:165:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0x00, size);
^~~~~~
drivers/tty/n_tty.c:176:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(to, from, size);
^~~~~~
drivers/tty/n_tty.c:176:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(to, from, size);
^~~~~~
drivers/tty/n_tty.c:184:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(to, from, n);
^~~~~~
drivers/tty/n_tty.c:184:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(to, from, n);
^~~~~~
drivers/tty/n_tty.c:1456:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(read_buf_addr(ldata, head), cp, n);
^~~~~~
drivers/tty/n_tty.c:1456:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(read_buf_addr(ldata, head), cp, n);
^~~~~~
drivers/tty/n_tty.c:1463:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(read_buf_addr(ldata, head), cp, n);
^~~~~~
drivers/tty/n_tty.c:1463:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(read_buf_addr(ldata, head), cp, n);
^~~~~~
drivers/tty/n_tty.c:1874:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(*kbp, from, n);
^~~~~~
drivers/tty/n_tty.c:1874:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(*kbp, from, n);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
fs/f2fs/gc.c:1280:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(fio.encrypted_page),
^~~~~~
fs/f2fs/gc.c:1280:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(fio.encrypted_page),
^~~~~~
include/linux/math64.h:92:15: warning: Division by zero [clang-analyzer-core.DivideZero]
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
^
fs/f2fs/gc.c:324:23: note: Assuming the condition is false
unsigned int secno = GET_SEC_FROM_SEG(sbi, segno);
^
fs/f2fs/segment.h:104:4: note: expanded from macro 'GET_SEC_FROM_SEG'
(((segno) == -1) ? -1: (segno) / (sbi)->segs_per_sec)
^~~~~~~~~~~~~
fs/f2fs/gc.c:324:23: note: '?' condition is false
unsigned int secno = GET_SEC_FROM_SEG(sbi, segno);
^
fs/f2fs/segment.h:104:3: note: expanded from macro 'GET_SEC_FROM_SEG'
(((segno) == -1) ? -1: (segno) / (sbi)->segs_per_sec)
^
fs/f2fs/gc.c:331:2: note: 'usable_segs_per_sec' initialized here
unsigned int usable_segs_per_sec = f2fs_usable_segs_in_sec(sbi, segno);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/f2fs/gc.c:333:14: note: Assuming 'i' is >= 'usable_segs_per_sec'
for (i = 0; i < usable_segs_per_sec; i++)
^~~~~~~~~~~~~~~~~~~~~~~
fs/f2fs/gc.c:333:2: note: Loop condition is false. Execution continues on line 335
for (i = 0; i < usable_segs_per_sec; i++)
^
fs/f2fs/gc.c:337:25: note: Passing the value 0 via 2nd parameter 'divisor'
mtime = div_u64(mtime, usable_segs_per_sec);
^~~~~~~~~~~~~~~~~~~
fs/f2fs/gc.c:337:10: note: Calling 'div_u64'
mtime = div_u64(mtime, usable_segs_per_sec);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/math64.h:128:31: note: Passing the value 0 via 2nd parameter 'divisor'
return div_u64_rem(dividend, divisor, &remainder);
--
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:160:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:160:3: note: Value stored to 'buffer' is never read
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:163:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian(7 * sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:163:3: note: Value stored to 'buffer' is never read
buffer += convert_endian(7 * sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:170:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian_n(24, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:170:3: note: Value stored to 'buffer' is never read
buffer += convert_endian_n(24, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:173:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian_n(8, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:173:3: note: Value stored to 'buffer' is never read
buffer += convert_endian_n(8, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:176:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian_n(17, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:176:3: note: Value stored to 'buffer' is never read
buffer += convert_endian_n(17, sizeof(u16), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:179:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian(3 * sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:179:3: note: Value stored to 'buffer' is never read
buffer += convert_endian(3 * sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:183:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:183:3: note: Value stored to 'buffer' is never read
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:186:3: warning: Value stored to 'buffer' is never read [clang-analyzer-deadcode.DeadStores]
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:186:3: note: Value stored to 'buffer' is never read
buffer += convert_endian(sizeof(u32), buffer);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl692.c:277:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plocal_buf, &buffer[ix], chunk_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:277:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plocal_buf, &buffer[ix], chunk_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:320:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plocal_buf, buffer, total_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:320:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plocal_buf, buffer, total_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:397:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plocal_buf, buffer, total_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:397:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plocal_buf, buffer, total_len);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:475:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tx_buf[MXL_EAGLE_HOST_MSG_HEADER_SIZE], tx_payload, tx_payload_size);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:475:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tx_buf[MXL_EAGLE_HOST_MSG_HEADER_SIZE], tx_payload, tx_payload_size);
^~~~~~
drivers/media/dvb-frontends/mxl692.c:555:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rx_payload, rx_buf + MXL_EAGLE_HOST_MSG_HEADER_SIZE,
^~~~~~
drivers/media/dvb-frontends/mxl692.c:555:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rx_payload, rx_buf + MXL_EAGLE_HOST_MSG_HEADER_SIZE,
^~~~~~
drivers/media/dvb-frontends/mxl692.c:1320:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = -ENOMEM;
^ ~~~~~~~
drivers/media/dvb-frontends/mxl692.c:1320:3: note: Value stored to 'ret' is never read
ret = -ENOMEM;
^ ~~~~~~~
drivers/media/dvb-frontends/mxl692.c:1325:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &mxl692_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/mxl692.c:1325:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &mxl692_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/media/dvb-frontends/tc90522.c:51:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = 0;
^ ~
drivers/media/dvb-frontends/tc90522.c:51:2: note: Value stored to 'ret' is never read
ret = 0;
^ ~
>> drivers/media/dvb-frontends/tc90522.c:283:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:283:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:297:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:297:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:343:2: warning: Value stored to 'mode' is never read [clang-analyzer-deadcode.DeadStores]
mode = 1;
^ ~
drivers/media/dvb-frontends/tc90522.c:343:2: note: Value stored to 'mode' is never read
mode = 1;
^ ~
drivers/media/dvb-frontends/tc90522.c:443:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:443:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:457:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats, 0, sizeof(*stats));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:457:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats, 0, sizeof(*stats));
^~~~~~
>> drivers/media/dvb-frontends/tc90522.c:682:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p + 2, msgs[i].buf, msgs[i].len);
^~~~~~
drivers/media/dvb-frontends/tc90522.c:682:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p + 2, msgs[i].buf, msgs[i].len);
^~~~~~
drivers/media/dvb-frontends/tc90522.c:797:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->cfg, cfg, sizeof(state->cfg));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:797:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->cfg, cfg, sizeof(state->cfg));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:800:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->fe.ops, ops, sizeof(*ops));
^~~~~~
drivers/media/dvb-frontends/tc90522.c:800:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->fe.ops, ops, sizeof(*ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/tuners/tda18212.c:197:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->cfg, cfg, sizeof(struct tda18212_config));
^~~~~~
drivers/media/tuners/tda18212.c:197:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->cfg, cfg, sizeof(struct tda18212_config));
^~~~~~
drivers/media/tuners/tda18212.c:234:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &tda18212_tuner_ops,
^~~~~~
drivers/media/tuners/tda18212.c:234:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &tda18212_tuner_ops,
^~~~~~
drivers/media/tuners/tda18212.c:252:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fe->ops.tuner_ops, 0, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/tuners/tda18212.c:252:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fe->ops.tuner_ops, 0, sizeof(struct dvb_tuner_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/media/tuners/fc2580.c:30:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:30:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:277:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:277:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:298:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:298:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:391:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:391:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:406:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:406:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:415:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:415:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:426:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:426:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:440:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:440:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:470:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:470:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/tuners/fc2580.c:577:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &fc2580_dvb_tuner_ops,
^~~~~~
drivers/media/tuners/fc2580.c:577:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &fc2580_dvb_tuner_ops,
--
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2173:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
INPUT_CLEANSE_BITMASK(dev, MSC, msc);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2173:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
INPUT_CLEANSE_BITMASK(dev, MSC, msc);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2174:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
INPUT_CLEANSE_BITMASK(dev, LED, led);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2174:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
INPUT_CLEANSE_BITMASK(dev, LED, led);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
INPUT_CLEANSE_BITMASK(dev, SND, snd);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2175:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
INPUT_CLEANSE_BITMASK(dev, SND, snd);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2176:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
INPUT_CLEANSE_BITMASK(dev, FF, ff);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2176:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
INPUT_CLEANSE_BITMASK(dev, FF, ff);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2177:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
INPUT_CLEANSE_BITMASK(dev, SW, sw);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
drivers/input/input.c:2177:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
INPUT_CLEANSE_BITMASK(dev, SW, sw);
^
drivers/input/input.c:2164:4: note: expanded from macro 'INPUT_CLEANSE_BITMASK'
memset(dev->bits##bit, 0, \
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
drivers/base/power/qos-test.c:16:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req1, 0, sizeof(req1));
^~~~~~
drivers/base/power/qos-test.c:16:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req1, 0, sizeof(req1));
^~~~~~
drivers/base/power/qos-test.c:17:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req2, 0, sizeof(req2));
^~~~~~
drivers/base/power/qos-test.c:17:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req2, 0, sizeof(req2));
^~~~~~
drivers/base/power/qos-test.c:44:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req1, 0, sizeof(req1));
^~~~~~
drivers/base/power/qos-test.c:44:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req1, 0, sizeof(req1));
^~~~~~
drivers/base/power/qos-test.c:45:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req2, 0, sizeof(req2));
^~~~~~
drivers/base/power/qos-test.c:45:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req2, 0, sizeof(req2));
^~~~~~
drivers/base/power/qos-test.c:85:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req, 0, sizeof(req));
^~~~~~
drivers/base/power/qos-test.c:85:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req, 0, sizeof(req));
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/ves1820.c:387:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ves1820_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/ves1820.c:387:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ves1820_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/ves1x93.c:493:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ves1x93_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/ves1x93.c:493:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ves1x93_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/dvb-frontends/sp887x.c:178:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], mem + i, c);
^~~~~~
drivers/media/dvb-frontends/sp887x.c:178:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], mem + i, c);
^~~~~~
drivers/media/dvb-frontends/sp887x.c:456:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
(sp887x_readreg(state, 0xc07) << 6);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/sp887x.c:456:10: note: Calling 'sp887x_readreg'
(sp887x_readreg(state, 0xc07) << 6);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:84:6: note: Assuming the condition is true
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:84:2: note: Taking true branch
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^
drivers/media/dvb-frontends/sp887x.c:85:3: note: Loop condition is false. Exiting loop
printk("%s: readreg error (ret == %i)\n", __func__, ret);
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/media/dvb-frontends/sp887x.c:86:3: note: Returning the value -1
return -1;
^~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:456:10: note: Returning from 'sp887x_readreg'
(sp887x_readreg(state, 0xc07) << 6);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:456:39: note: The result of the left shift is undefined because the left operand is negative
(sp887x_readreg(state, 0xc07) << 6);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/sp887x.c:583:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/sp887x.c:583:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/misc/xilinx_sdfec.c:298:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&status, 0, sizeof(status));
^~~~~~
drivers/misc/xilinx_sdfec.c:298:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&status, 0, sizeof(status));
^~~~~~
drivers/misc/xilinx_sdfec.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&turbo_params, 0, sizeof(turbo_params));
^~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
drivers/misc/xilinx_sdfec.c:1416:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(xsdfec->dev_name, DEV_NAME_LEN, "xsdfec%d", xsdfec->dev_id);
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/media/dvb-core/dmxdev.c:741:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&((*secfilter)->filter_value[3]),
^~~~~~
drivers/media/dvb-core/dmxdev.c:741:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&((*secfilter)->filter_value[3]),
^~~~~~
drivers/media/dvb-core/dmxdev.c:743:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(*secfilter)->filter_mask[3],
^~~~~~
drivers/media/dvb-core/dmxdev.c:743:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&(*secfilter)->filter_mask[3],
^~~~~~
drivers/media/dvb-core/dmxdev.c:745:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(*secfilter)->filter_mode[3],
--
^
drivers/ata/libata-transport.c:371:2: note: expanded from macro 'ata_link_linkspeed_attr'
ata_link_show_linkspeed(field, format) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/ata/libata-transport.c:367:9: note: expanded from macro 'ata_link_show_linkspeed'
return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
^~~~~~~
drivers/ata/libata-transport.c:376:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ata_link_linkspeed_attr(sata_spd, noop);
^
drivers/ata/libata-transport.c:371:2: note: expanded from macro 'ata_link_linkspeed_attr'
ata_link_show_linkspeed(field, format) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/ata/libata-transport.c:367:9: note: expanded from macro 'ata_link_show_linkspeed'
return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
^~~~~~~
drivers/ata/libata-transport.c:376:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ata_link_linkspeed_attr(sata_spd, noop);
^
drivers/ata/libata-transport.c:371:2: note: expanded from macro 'ata_link_linkspeed_attr'
ata_link_show_linkspeed(field, format) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/ata/libata-transport.c:367:9: note: expanded from macro 'ata_link_show_linkspeed'
return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
^~~~~~~
drivers/ata/libata-transport.c:534:18: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
arg->written += sprintf(arg->buf + arg->written,
^~~~~~~
drivers/ata/libata-transport.c:534:18: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
arg->written += sprintf(arg->buf + arg->written,
^~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/tty/tty_buffer.c:326:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(char_buf_ptr(tb, tb->used), chars, space);
^~~~~~
drivers/tty/tty_buffer.c:326:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(char_buf_ptr(tb, tb->used), chars, space);
^~~~~~
drivers/tty/tty_buffer.c:328:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(flag_buf_ptr(tb, tb->used), flag, space);
^~~~~~
drivers/tty/tty_buffer.c:328:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(flag_buf_ptr(tb, tb->used), flag, space);
^~~~~~
drivers/tty/tty_buffer.c:364:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(char_buf_ptr(tb, tb->used), chars, space);
^~~~~~
drivers/tty/tty_buffer.c:364:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(char_buf_ptr(tb, tb->used), chars, space);
^~~~~~
drivers/tty/tty_buffer.c:365:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(flag_buf_ptr(tb, tb->used), flags, space);
^~~~~~
drivers/tty/tty_buffer.c:365:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(flag_buf_ptr(tb, tb->used), flags, space);
^~~~~~
drivers/tty/tty_buffer.c:428:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(flag_buf_ptr(tb, tb->used), TTY_NORMAL, space);
^~~~~~
drivers/tty/tty_buffer.c:428:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(flag_buf_ptr(tb, tb->used), TTY_NORMAL, space);
^~~~~~
drivers/tty/tty_buffer.c:473:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, n);
^~~~~~
drivers/tty/tty_buffer.c:473:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, n);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/tty/serial/sccnxp.c:949:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
drivers/tty/serial/sccnxp.c:949:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/tty/serial/uartlite.c:387:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = uart_in32(ULITE_CONTROL, port);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/serial/uartlite.c:387:2: note: Value stored to 'ret' is never read
ret = uart_in32(ULITE_CONTROL, port);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/power/supply/wm8350_power.c:179:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", charge);
^~~~~~~
drivers/power/supply/wm8350_power.c:179:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", charge);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/pps/clients/pps-gpio.c:189:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(data->info.name, PPS_MAX_NAME_LEN - 1, "%s.%d",
^~~~~~~~
drivers/pps/clients/pps-gpio.c:189:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(data->info.name, PPS_MAX_NAME_LEN - 1, "%s.%d",
^~~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
100 warnings generated.
drivers/w1/w1.c:76:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(md, 0, sizeof(struct w1_master) + sizeof(struct w1_bus_master));
^~~~~~
drivers/w1/w1.c:76:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(md, 0, sizeof(struct w1_master) + sizeof(struct w1_bus_master));
^~~~~~
drivers/w1/w1.c:94:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sl->name);
^~~~~~~
drivers/w1/w1.c:94:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sl->name);
^~~~~~~
drivers/w1/w1.c:104:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, (u8 *)&sl->reg_num, count);
^~~~~~
drivers/w1/w1.c:104:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, (u8 *)&sl->reg_num, count);
^~~~~~
drivers/w1/w1.c:216:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%s\n", md->name);
^~~~~~~
drivers/w1/w1.c:216:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%s\n", md->name);
^~~~~~~
drivers/w1/w1.c:252:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", md->search_count);
^~~~~~~
drivers/w1/w1.c:252:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", md->search_count);
^~~~~~~
drivers/w1/w1.c:285:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", md->enable_pullup);
^~~~~~~
drivers/w1/w1.c:285:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", md->enable_pullup);
^~~~~~~
drivers/w1/w1.c:297:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "0x%p\n", md->bus_master);
^~~~~~~
drivers/w1/w1.c:297:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "0x%p\n", md->bus_master);
^~~~~~~
drivers/w1/w1.c:305:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", w1_timeout);
^~~~~~~
drivers/w1/w1.c:305:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", w1_timeout);
^~~~~~~
drivers/w1/w1.c:313:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", w1_timeout_us);
^~~~~~~
drivers/w1/w1.c:313:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", w1_timeout_us);
^~~~~~~
drivers/w1/w1.c:341:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", md->max_slave_count);
^~~~~~~
drivers/w1/w1.c:341:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", md->max_slave_count);
^~~~~~~
drivers/w1/w1.c:352:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%lu\n", md->attempts);
^~~~~~~
drivers/w1/w1.c:352:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%lu\n", md->attempts);
^~~~~~~
drivers/w1/w1.c:363:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(buf, "%d\n", md->slave_count);
^~~~~~~
drivers/w1/w1.c:363:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(buf, "%d\n", md->slave_count);
^~~~~~~
drivers/w1/w1.c:381:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
c -= snprintf(buf + PAGE_SIZE - c, c, "%s\n", sl->name);
--
drivers/media/tuners/tuner-xc2028.c:769:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:769:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&priv->cur_fw, 0, sizeof(priv->cur_fw));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1037:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = send_seq(priv, {0x00, 0x00});
^
drivers/media/tuners/tuner-xc2028.c:1037:3: note: Value stored to 'rc' is never read
drivers/media/tuners/tuner-xc2028.c:1396:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->ctrl, p, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1396:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->ctrl, p, sizeof(priv->ctrl));
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1497:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &xc2028_dvb_tuner_ops,
^~~~~~
drivers/media/tuners/tuner-xc2028.c:1497:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &xc2028_dvb_tuner_ops,
^~~~~~
Suppressed 47 warnings (45 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
drivers/w1/w1_int.c:65:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->dev, device, sizeof(struct device));
^~~~~~
drivers/w1/w1_int.c:65:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->dev, device, sizeof(struct device));
^~~~~~
drivers/w1/w1_int.c:67:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dev->name, sizeof(dev->name), "w1_bus_master%u", dev->id);
^~~~~~~~
drivers/w1/w1_int.c:67:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dev->name, sizeof(dev->name), "w1_bus_master%u", dev->id);
^~~~~~~~
drivers/w1/w1_int.c:136:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->bus_master, master, sizeof(struct w1_bus_master));
^~~~~~
drivers/w1/w1_int.c:136:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->bus_master, master, sizeof(struct w1_bus_master));
^~~~~~
drivers/w1/w1_int.c:153:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/w1/w1_int.c:153:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/w1/w1_int.c:212:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/w1/w1_int.c:212:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&msg, 0, sizeof(msg));
^~~~~~
Suppressed 70 warnings (70 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/i2c/lm3560.c:123:3: warning: Value stored to 'rval' is never read [clang-analyzer-deadcode.DeadStores]
rval = lm3560_enable_ctrl(flash, led_no, true);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/lm3560.c:123:3: note: Value stored to 'rval' is never read
rval = lm3560_enable_ctrl(flash, led_no, true);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/lm3560.c:146:3: warning: Value stored to 'rval' is never read [clang-analyzer-deadcode.DeadStores]
rval = lm3560_enable_ctrl(flash, led_no, true);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/lm3560.c:146:3: note: Value stored to 'rval' is never read
rval = lm3560_enable_ctrl(flash, led_no, true);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/media/i2c/ir-kbd-i2c.c:861:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(ir->phys, sizeof(ir->phys), "%s/%s", dev_name(&adap->dev),
^~~~~~~~
drivers/media/i2c/ir-kbd-i2c.c:861:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(ir->phys, sizeof(ir->phys), "%s/%s", dev_name(&adap->dev),
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/dvb-frontends/si21xx.c:238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.buf + 1, data, len);
^~~~~~
drivers/media/dvb-frontends/si21xx.c:238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg.buf + 1, data, len);
^~~~~~
drivers/media/dvb-frontends/si21xx.c:931:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &si21xx_ops,
^~~~~~
drivers/media/dvb-frontends/si21xx.c:931:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &si21xx_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/media/dvb-frontends/si2168.c:16:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmd->args, buf, wlen);
^~~~~~
drivers/media/dvb-frontends/si2168.c:16:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmd->args, buf, wlen);
^~~~~~
drivers/media/dvb-frontends/si2168.c:753:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &si2168_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/si2168.c:753:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &si2168_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/mtd/inftlmount.c:104:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mh, buf, sizeof(struct INFTLMediaHeader));
^~~~~~
drivers/mtd/inftlmount.c:104:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mh, buf, sizeof(struct INFTLMediaHeader));
^~~~~~
drivers/mtd/inftlmount.c:371:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(instr, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/inftlmount.c:371:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(instr, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/inftlmount.c:550:2: warning: Value stored to 'logical_block' is never read [clang-analyzer-deadcode.DeadStores]
logical_block = block = BLOCK_NIL;
^ ~~~~~~~~~~~~~~~~~
drivers/mtd/inftlmount.c:550:2: note: Value stored to 'logical_block' is never read
logical_block = block = BLOCK_NIL;
^ ~~~~~~~~~~~~~~~~~
drivers/mtd/inftlmount.c:550:18: warning: Although the value stored to 'block' is used in the enclosing expression, the value is never actually read from 'block' [clang-analyzer-deadcode.DeadStores]
logical_block = block = BLOCK_NIL;
^
drivers/mtd/inftlmount.c:550:18: note: Although the value stored to 'block' is used in the enclosing expression, the value is never actually read from 'block'
drivers/mtd/inftlmount.c:693:3: warning: Value stored to 'logical_block' is never read [clang-analyzer-deadcode.DeadStores]
logical_block = BLOCK_NIL;
^
drivers/mtd/inftlmount.c:693:3: note: Value stored to 'logical_block' is never read
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/media/dvb-frontends/zd1301_demod.c:40:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:40:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:148:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:148:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:181:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:181:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:215:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:215:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:229:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:229:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:313:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:313:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = dev->pdev;
^~~~ ~~~~~~~~~
>> drivers/media/dvb-frontends/zd1301_demod.c:505:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->frontend.ops, &zd1301_demod_ops, sizeof(dev->frontend.ops));
^~~~~~
drivers/media/dvb-frontends/zd1301_demod.c:505:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->frontend.ops, &zd1301_demod_ops, sizeof(dev->frontend.ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/xfs/libxfs/xfs_dir2_data.c:239:20: warning: Access to field 'count' results in a dereference of a null pointer (loaded from variable 'btp') [clang-analyzer-core.NullDereference]
for (i = 0; i < be32_to_cpu(btp->count); i++) {
^
include/linux/byteorder/generic.h:95:21: note: expanded from macro 'be32_to_cpu'
#define be32_to_cpu __be32_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:41:58: note: expanded from macro '__be32_to_cpu'
#define __be32_to_cpu(x) __swab32((__force __u32)(__be32)(x))
^
fs/xfs/libxfs/xfs_dir2_data.c:365:7: note: Calling 'xfs_dir3_data_verify'
fa = xfs_dir3_data_verify(bp);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:297:6: note: Assuming the condition is false
if (!xfs_verify_magic(bp, hdr3->magic))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:297:2: note: Taking false branch
if (!xfs_verify_magic(bp, hdr3->magic))
^
fs/xfs/libxfs/xfs_dir2_data.c:300:6: note: Assuming the condition is false
if (xfs_has_crc(mp)) {
^~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:300:2: note: Taking false branch
if (xfs_has_crc(mp)) {
^
fs/xfs/libxfs/xfs_dir2_data.c:308:9: note: Calling '__xfs_dir3_data_check'
return __xfs_dir3_data_check(NULL, bp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:104:2: note: 'btp' initialized to a null pointer value
xfs_dir2_block_tail_t *btp=NULL; /* block tail */
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:123:6: note: 'dp' is null
if (dp && !S_ISDIR(VFS_I(dp)->i_mode))
^~
fs/xfs/libxfs/xfs_dir2_data.c:123:9: note: Left side of '&&' is false
if (dp && !S_ISDIR(VFS_I(dp)->i_mode))
^
fs/xfs/libxfs/xfs_dir2_data.c:129:2: note: Control jumps to 'case 860111960:' at line 139
switch (hdr->magic) {
^
fs/xfs/libxfs/xfs_dir2_data.c:141:3: note: Execution continues on line 145
break;
^
fs/xfs/libxfs/xfs_dir2_data.c:145:8: note: Calling 'xfs_dir3_data_end_offset'
end = xfs_dir3_data_end_offset(geo, hdr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:1212:2: note: Control jumps to 'case 860111960:' at line 1217
switch (hdr->magic) {
^
fs/xfs/libxfs/xfs_dir2_data.c:1219:3: note: Returning without writing to 'geo->blksize', which participates in a condition later
return geo->blksize;
^
fs/xfs/libxfs/xfs_dir2_data.c:1219:3: note: Returning value, which participates in a condition later
return geo->blksize;
^~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:145:8: note: Returning from 'xfs_dir3_data_end_offset'
end = xfs_dir3_data_end_offset(geo, hdr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:146:6: note: Assuming 'end' is not equal to 0
if (!end)
^~~~
fs/xfs/libxfs/xfs_dir2_data.c:146:2: note: Taking false branch
if (!end)
^
fs/xfs/libxfs/xfs_dir2_data.c:154:6: note: Assuming field 'length' is not equal to 0
if (!bf[0].length) {
^~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:154:2: note: Taking false branch
if (!bf[0].length) {
^
fs/xfs/libxfs/xfs_dir2_data.c:159:6: note: Assuming field 'length' is not equal to 0
if (!bf[1].length) {
^~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:159:2: note: Taking false branch
if (!bf[1].length) {
^
fs/xfs/libxfs/xfs_dir2_data.c:164:6: note: Assuming field 'length' is not equal to 0
if (!bf[2].length) {
^~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_data.c:164:2: note: Taking false branch
if (!bf[2].length) {
^
fs/xfs/libxfs/xfs_dir2_data.c:170:6: note: Assuming the condition is false
if (be16_to_cpu(bf[0].length) < be16_to_cpu(bf[1].length))
^
include/linux/byteorder/generic.h:97:21: note: expanded from macro 'be16_to_cpu'
#define be16_to_cpu __be16_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:43:26: note: expanded from macro '__be16_to_cpu'
#define __be16_to_cpu(x) __swab16((__force __u16)(__be16)(x))
^
include/uapi/linux/swab.h:102:21: note: expanded from macro '__swab16'
#define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
--
^
drivers/media/dvb-frontends/cxd2099.c:74:2: note: Returning without writing to '*data'
return status;
^
drivers/media/dvb-frontends/cxd2099.c:79:9: note: Returning from 'read_block'
return read_block(ci, reg, val, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2099.c:79:2: note: Returning without writing to '*val'
return read_block(ci, reg, val, 1);
^
drivers/media/dvb-frontends/cxd2099.c:506:3: note: Returning from 'read_reg'
read_reg(ci, 0x01, &slotstat);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2099.c:507:11: note: The right operand of '&' is a garbage value
if (!(2 & slotstat)) {
^ ~~~~~~~~
drivers/media/dvb-frontends/cxd2099.c:620:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ci->cfg, cfg, sizeof(ci->cfg));
^~~~~~
drivers/media/dvb-frontends/cxd2099.c:620:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ci->cfg, cfg, sizeof(ci->cfg));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/media/i2c/ov2659.c:895:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:895:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:986:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:986:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1002:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1002:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1028:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1028:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1151:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1151:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1160:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1160:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = ov2659->client;
^~~~~~ ~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1312:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov2659.c:1312:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = v4l2_get_subdevdata(sd);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/base/firmware_loader/main.c:270:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_pages, fw_priv->pages,
^~~~~~
drivers/base/firmware_loader/main.c:270:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_pages, fw_priv->pages,
^~~~~~
drivers/base/firmware_loader/main.c:272:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&new_pages[fw_priv->page_array_size], 0, sizeof(void *) *
^~~~~~
drivers/base/firmware_loader/main.c:272:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&new_pages[fw_priv->page_array_size], 0, sizeof(void *) *
^~~~~~
drivers/base/firmware_loader/main.c:458:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(path, PATH_MAX, "%s/%s%s",
^~~~~~~~
drivers/base/firmware_loader/main.c:458:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(path, PATH_MAX, "%s/%s%s",
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/media/common/siano/smsir.c:55:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(coredev->ir.name, sizeof(coredev->ir.name),
^~~~~~~~
drivers/media/common/siano/smsir.c:55:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(coredev->ir.name, sizeof(coredev->ir.name),
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> drivers/media/common/siano/smsdvb-main.c:1153:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&client->frontend.ops, &smsdvb_fe_ops,
^~~~~~
drivers/media/common/siano/smsdvb-main.c:1153:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&client->frontend.ops, &smsdvb_fe_ops,
^~~~~~
Suppressed 49 warnings (47 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:91:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tpg, 0, sizeof(*tpg));
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:91:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tpg, 0, sizeof(*tpg));
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:598:6: warning: Division by zero [clang-analyzer-core.DivideZero]
aux /= diff_rgb;
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:856:6: note: Assuming 'k' is not equal to TPG_COLOR_TEXTBG
if (k == TPG_COLOR_TEXTBG) {
^~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:856:2: note: Taking false branch
if (k == TPG_COLOR_TEXTBG) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:862:13: note: Assuming 'k' is not equal to TPG_COLOR_TEXTFG
} else if (k == TPG_COLOR_TEXTFG) {
^~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:862:9: note: Taking false branch
} else if (k == TPG_COLOR_TEXTFG) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:868:13: note: Assuming field 'pattern' is not equal to TPG_PAT_NOISE
} else if (tpg->pattern == TPG_PAT_NOISE) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:868:9: note: Taking false branch
} else if (tpg->pattern == TPG_PAT_NOISE) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:870:13: note: Assuming 'k' is not equal to TPG_COLOR_RANDOM
} else if (k == TPG_COLOR_RANDOM) {
^~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:870:9: note: Taking false branch
} else if (k == TPG_COLOR_RANDOM) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:872:13: note: Assuming 'k' is < TPG_COLOR_RAMP
} else if (k >= TPG_COLOR_RAMP) {
^~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:872:9: note: Taking false branch
} else if (k >= TPG_COLOR_RAMP) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:876:6: note: Assuming field 'pattern' is not equal to TPG_PAT_CSC_COLORBAR
if (tpg->pattern == TPG_PAT_CSC_COLORBAR && col <= TPG_COLOR_CSC_BLACK) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:876:43: note: Left side of '&&' is false
if (tpg->pattern == TPG_PAT_CSC_COLORBAR && col <= TPG_COLOR_CSC_BLACK) {
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:886:6: note: Assuming field 'qual' is not equal to TPG_QUAL_GRAY
if (tpg->qual == TPG_QUAL_GRAY ||
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:886:6: note: Left side of '||' is false
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:887:6: note: Assuming field 'color_enc' is not equal to TGP_COLOR_ENC_LUMA
tpg->color_enc == TGP_COLOR_ENC_LUMA) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:886:2: note: Taking false branch
if (tpg->qual == TPG_QUAL_GRAY ||
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:900:6: note: Assuming field 'real_rgb_range' is not equal to V4L2_DV_RGB_RANGE_LIMITED
if (tpg->real_rgb_range == V4L2_DV_RGB_RANGE_LIMITED &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:900:55: note: Left side of '&&' is false
if (tpg->real_rgb_range == V4L2_DV_RGB_RANGE_LIMITED &&
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:911:18: note: Field 'real_rgb_range' is not equal to V4L2_DV_RGB_RANGE_LIMITED
} else if (tpg->real_rgb_range != V4L2_DV_RGB_RANGE_LIMITED &&
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:911:13: note: Left side of '&&' is true
} else if (tpg->real_rgb_range != V4L2_DV_RGB_RANGE_LIMITED &&
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:912:6: note: Assuming field 'rgb_range' is not equal to V4L2_DV_RGB_RANGE_LIMITED
tpg->rgb_range == V4L2_DV_RGB_RANGE_LIMITED &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:912:50: note: Left side of '&&' is false
tpg->rgb_range == V4L2_DV_RGB_RANGE_LIMITED &&
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:927:7: note: Assuming field 'brightness' is equal to 128
if ((tpg->brightness != 128 || tpg->contrast != 128 ||
^~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:927:7: note: Left side of '||' is false
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:927:33: note: Assuming field 'contrast' is equal to 128
if ((tpg->brightness != 128 || tpg->contrast != 128 ||
^~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:927:7: note: Left side of '||' is false
if ((tpg->brightness != 128 || tpg->contrast != 128 ||
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:928:7: note: Assuming field 'saturation' is equal to 128
tpg->saturation != 128 || tpg->hue) &&
^~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:927:7: note: Left side of '||' is false
if ((tpg->brightness != 128 || tpg->contrast != 128 ||
^
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:928:33: note: Assuming field 'hue' is 0
tpg->saturation != 128 || tpg->hue) &&
^~~~~~~~
--
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2354:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf + params->right_pillar_start, tpg->black_line[p],
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2373:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf + left, tpg->contrast_line[p], width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2373:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf + left, tpg->contrast_line[p], width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2527:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2527:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2529:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2529:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2533:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2533:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2535:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2535:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2538:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2538:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_top, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2541:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2541:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_bottom, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2545:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vbuf, linestart_older, img_width);
^~~~~~
drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2545:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vbuf, linestart_older, img_width);
^~~~~~
Suppressed 10 warnings (9 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/base/firmware_loader/fallback.c:314:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, fw_priv->data + offset, count);
^~~~~~
drivers/base/firmware_loader/fallback.c:314:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, fw_priv->data + offset, count);
^~~~~~
drivers/base/firmware_loader/fallback.c:316:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fw_priv->data + offset, buffer, count);
^~~~~~
drivers/base/firmware_loader/fallback.c:316:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fw_priv->data + offset, buffer, count);
^~~~~~
drivers/base/firmware_loader/fallback.c:331:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, page_data + page_ofs, page_cnt);
^~~~~~
drivers/base/firmware_loader/fallback.c:331:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, page_data + page_ofs, page_cnt);
^~~~~~
drivers/base/firmware_loader/fallback.c:333:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_data + page_ofs, buffer, page_cnt);
^~~~~~
drivers/base/firmware_loader/fallback.c:333:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_data + page_ofs, buffer, page_cnt);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/input/joystick/interact.c:235:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(interact->phys, sizeof(interact->phys), "%s/input0", gameport->phys);
^~~~~~~~
drivers/input/joystick/interact.c:235:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(interact->phys, sizeof(interact->phys), "%s/input0", gameport->phys);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/input/joystick/magellan.c:144:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(magellan->phys, sizeof(magellan->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/joystick/magellan.c:144:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(magellan->phys, sizeof(magellan->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> drivers/input/joystick/spaceball.c:211:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(spaceball->phys, sizeof(spaceball->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/joystick/spaceball.c:211:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(spaceball->phys, sizeof(spaceball->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/scsi/libsas/sas_discover.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->frame_rcvd, phy->frame_rcvd, min(sizeof(dev->frame_rcvd),
^~~~~~
drivers/scsi/libsas/sas_discover.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->frame_rcvd, phy->frame_rcvd, min(sizeof(dev->frame_rcvd),
^~~~~~
drivers/scsi/libsas/sas_discover.c:134:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->sas_addr, port->attached_sas_addr, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:134:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->sas_addr, port->attached_sas_addr, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:142:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port->disc.fanout_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:142:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port->disc.fanout_sas_addr, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:143:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port->disc.eeds_a, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:143:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port->disc.eeds_a, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:144:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(port->disc.eeds_b, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:144:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(port->disc.eeds_b, 0, SAS_ADDR_SIZE);
^~~~~~
drivers/scsi/libsas/sas_discover.c:248:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
list_for_each_entry(dev, &port->dev_list, dev_list_node)
^
include/linux/list.h:640:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/scsi/libsas/sas_discover.c:240:2: note: '?' condition is true
clear_bit(DISCE_SUSPEND, &port->disc.pending);
^
arch/arm/include/asm/bitops.h:190:27: note: expanded from macro 'clear_bit'
#define clear_bit(nr,p) ATOMIC_BITOP(clear_bit,nr,p)
^
arch/arm/include/asm/bitops.h:181:3: note: expanded from macro 'ATOMIC_BITOP'
(__builtin_constant_p(nr) ? ____atomic_##name(nr, p) : _##name(nr,p))
^
drivers/scsi/libsas/sas_discover.c:248:2: note: Loop condition is true. Entering loop body
list_for_each_entry(dev, &port->dev_list, dev_list_node)
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/scsi/libsas/sas_discover.c:249:3: note: Calling 'sas_notify_lldd_dev_gone'
sas_notify_lldd_dev_gone(dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_discover.c:198:6: note: Assuming field 'lldd_dev_gone' is non-null
if (!i->dft->lldd_dev_gone)
^~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_discover.c:198:2: note: Taking false branch
if (!i->dft->lldd_dev_gone)
^
drivers/scsi/libsas/sas_discover.c:201:6: note: '?' condition is true
if (test_and_clear_bit(SAS_DEV_FOUND, &dev->state)) {
^
arch/arm/include/asm/bitops.h:193:34: note: expanded from macro 'test_and_clear_bit'
#define test_and_clear_bit(nr,p) ATOMIC_BITOP(test_and_clear_bit,nr,p)
^
arch/arm/include/asm/bitops.h:181:3: note: expanded from macro 'ATOMIC_BITOP'
(__builtin_constant_p(nr) ? ____atomic_##name(nr, p) : _##name(nr,p))
^
drivers/scsi/libsas/sas_discover.c:201:6: note: Assuming the condition is true
if (test_and_clear_bit(SAS_DEV_FOUND, &dev->state)) {
^
arch/arm/include/asm/bitops.h:193:34: note: expanded from macro 'test_and_clear_bit'
#define test_and_clear_bit(nr,p) ATOMIC_BITOP(test_and_clear_bit,nr,p)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/include/asm/bitops.h:181:3: note: expanded from macro 'ATOMIC_BITOP'
(__builtin_constant_p(nr) ? ____atomic_##name(nr, p) : _##name(nr,p))
^~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_discover.c:201:2: note: Taking true branch
if (test_and_clear_bit(SAS_DEV_FOUND, &dev->state)) {
--
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/pcmcia/ds.c:105:11: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:105:11: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:121:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dynid->id.prod_id_hash, prod_id_hash, sizeof(__u32) * 4);
^~~~~~
drivers/pcmcia/ds.c:121:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dynid->id.prod_id_hash, prod_id_hash, sizeof(__u32) * 4);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/pcmcia/cistpl.c:155:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:155:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:172:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:172:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:188:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:188:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:299:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, s->fake_cis+addr, len);
^~~~~~
drivers/pcmcia/cistpl.c:299:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, s->fake_cis+addr, len);
^~~~~~
drivers/pcmcia/cistpl.c:301:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:301:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0xff, len);
^~~~~~
drivers/pcmcia/cistpl.c:310:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, cis->cache, len);
^~~~~~
drivers/pcmcia/cistpl.c:310:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, cis->cache, len);
^~~~~~
drivers/pcmcia/cistpl.c:325:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cis->cache, ptr, len);
^~~~~~
drivers/pcmcia/cistpl.c:325:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cis->cache, ptr, len);
^~~~~~
drivers/pcmcia/cistpl.c:426:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->fake_cis, data, len);
^~~~~~
drivers/pcmcia/cistpl.c:426:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->fake_cis, data, len);
^~~~~~
drivers/pcmcia/cistpl.c:1493:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tuple, 0, sizeof(tuple_t));
^~~~~~
drivers/pcmcia/cistpl.c:1493:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tuple, 0, sizeof(tuple_t));
^~~~~~
drivers/pcmcia/cistpl.c:1503:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tuplebuffer, 0, sizeof(u_char) * 255);
^~~~~~
drivers/pcmcia/cistpl.c:1503:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tuplebuffer, 0, sizeof(u_char) * 255);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/dvb-pll.c:832:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &dvb_pll_tuner_ops,
^~~~~~
drivers/media/dvb-frontends/dvb-pll.c:832:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &dvb_pll_tuner_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/stv0299.c:695:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &stv0299_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/stv0299.c:695:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &stv0299_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/stb0899_drv.c:504:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], data, count);
^~~~~~
drivers/media/dvb-frontends/stb0899_drv.c:504:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], data, count);
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/dvb-frontends/stb0899_algo.c:218:4: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
STB0899_SETFIELD_VAL(CFRM, cfr[0], MSB(internal->inversion * derot_freq));
^
drivers/media/dvb-frontends/stb0899_priv.h:61:61: note: expanded from macro 'STB0899_SETFIELD_VAL'
#define STB0899_SETFIELD_VAL(bitf, mask, val) (mask = (mask & (~(((1 << STB0899_WIDTH_##bitf) - 1) <<\
^
drivers/media/dvb-frontends/stb0899_algo.c:515:6: note: Assuming field 'srate' is > 5000000
if (params->srate <= 5000000) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stb0899_algo.c:515:2: note: Taking false branch
if (params->srate <= 5000000) {
^
drivers/media/dvb-frontends/stb0899_algo.c:521:13: note: Assuming field 'srate' is > 15000000
} else if (params->srate <= 15000000) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stb0899_algo.c:521:9: note: Taking false branch
} else if (params->srate <= 15000000) {
^
drivers/media/dvb-frontends/stb0899_algo.c:527:12: note: Assuming field 'srate' is > 25000000
} else if(params->srate <= 25000000) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stb0899_algo.c:527:9: note: Taking false branch
} else if(params->srate <= 25000000) {
^
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Taking true branch
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:23:2: note: expanded from macro 'dprintk'
if (z) { \
^
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Assuming the condition is true
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:24:8: note: expanded from macro 'dprintk'
if ((*x > FE_ERROR) && (*x > y)) \
^~~~~~~~~~~~~
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Left side of '&&' is true
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:24:7: note: expanded from macro 'dprintk'
if ((*x > FE_ERROR) && (*x > y)) \
^
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Assuming the condition is true
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:24:27: note: expanded from macro 'dprintk'
if ((*x > FE_ERROR) && (*x > y)) \
^~~~~~
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Taking true branch
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:24:3: note: expanded from macro 'dprintk'
if ((*x > FE_ERROR) && (*x > y)) \
^
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Loop condition is false. Exiting loop
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:25:4: note: expanded from macro 'dprintk'
printk(KERN_ERR "%s: " format "\n", __func__ , ##arg); \
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/media/dvb-frontends/stb0899_algo.c:541:2: note: Loop condition is false. Exiting loop
dprintk(state->verbose, FE_DEBUG, 1, "Set the timing loop to acquisition");
^
drivers/media/dvb-frontends/stb0899_priv.h:22:42: note: expanded from macro 'dprintk'
#define dprintk(x, y, z, format, arg...) do { \
^
drivers/media/dvb-frontends/stb0899_algo.c:552:2: note: Taking true branch
dprintk(state->verbose, FE_DEBUG, 1, "Derot Percent=%d Srate=%d mclk=%d",
^
drivers/media/dvb-frontends/stb0899_priv.h:23:2: note: expanded from macro 'dprintk'
if (z) { \
^
drivers/media/dvb-frontends/stb0899_algo.c:552:2: note: Assuming the condition is false
dprintk(state->verbose, FE_DEBUG, 1, "Derot Percent=%d Srate=%d mclk=%d",
--
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/media/i2c/ov5647.c:625:3: note: Returning without writing to '*val'
return ret;
^
drivers/media/i2c/ov5647.c:809:8: note: Returning from 'ov5647_read'
ret = ov5647_read(&sensor->sd, OV5647_SW_STANDBY, &rdval);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ov5647.c:810:6: note: 'ret' is < 0
if (ret < 0)
^~~
drivers/media/i2c/ov5647.c:810:2: note: Taking true branch
if (ret < 0)
^
drivers/media/i2c/ov5647.c:811:3: note: Taking false branch
dev_dbg(dev, "software standby failed\n");
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/media/i2c/ov5647.c:813:8: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
rdval &= ~0x01;
~~~~~ ^
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/hwmon/mcp3021.c:98:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", in_input);
^~~~~~~
drivers/hwmon/mcp3021.c:98:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", in_input);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/hwmon/tc654.c:209:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:209:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:221:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/tc654.c:221:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/tc654.c:264:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:264:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:280:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:280:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/tc654.c:332:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->config & TC654_REG_CONFIG_DUTYC));
^~~~~~~
drivers/hwmon/tc654.c:332:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->config & TC654_REG_CONFIG_DUTYC));
^~~~~~~
drivers/hwmon/tc654.c:379:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pwm);
^~~~~~~
drivers/hwmon/tc654.c:379:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pwm);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/i2c/busses/i2c-pca-platform.c:161:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(i2c->adap.name, sizeof(i2c->adap.name),
^~~~~~~~
drivers/i2c/busses/i2c-pca-platform.c:161:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(i2c->adap.name, sizeof(i2c->adap.name),
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/i2c/busses/i2c-rk3x.c:897:2: warning: Value stored to 't_low_ns' is never read [clang-analyzer-deadcode.DeadStores]
t_low_ns = div_u64(((u64)calc.div_low + 1) * 8 * 1000000000, clk_rate);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i2c/busses/i2c-rk3x.c:897:2: note: Value stored to 't_low_ns' is never read
t_low_ns = div_u64(((u64)calc.div_low + 1) * 8 * 1000000000, clk_rate);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i2c/busses/i2c-rk3x.c:898:2: warning: Value stored to 't_high_ns' is never read [clang-analyzer-deadcode.DeadStores]
t_high_ns = div_u64(((u64)calc.div_high + 1) * 8 * 1000000000,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i2c/busses/i2c-rk3x.c:898:2: note: Value stored to 't_high_ns' is never read
t_high_ns = div_u64(((u64)calc.div_high + 1) * 8 * 1000000000,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/i2c/busses/i2c-s3c2410.c:1075:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(i2c->pdata, pdata, sizeof(*pdata));
^~~~~~
drivers/i2c/busses/i2c-s3c2410.c:1075:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(i2c->pdata, pdata, sizeof(*pdata));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/media/dvb-frontends/cxd2820r_c.c:14:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:14:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:15:34: warning: Value stored to 'c' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:15:34: note: Value stored to 'c' during its initialization is never read
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:92:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:92:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:145:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:145:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:281:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:281:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:299:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:299:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/s921.c:492:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s921_ops,
^~~~~~
drivers/media/dvb-frontends/s921.c:492:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s921_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/media/dvb-frontends/stv6110.c:79:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cmdbuf[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:79:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cmdbuf[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:125:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->regs[start], regs, len);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:125:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->regs[start], regs, len);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:206:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->regs, buf0, 8);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:206:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->regs, buf0, 8);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:421:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->regs, ®0[1], 8);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:421:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->regs, ®0[1], 8);
^~~~~~
drivers/media/dvb-frontends/stv6110.c:423:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &stv6110_tuner_ops,
^~~~~~
drivers/media/dvb-frontends/stv6110.c:423:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &stv6110_tuner_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
fs/f2fs/recovery.c:124:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fname, 0, sizeof(*fname));
^~~~~~
fs/f2fs/recovery.c:124:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fname, 0, sizeof(*fname));
^~~~~~
fs/f2fs/recovery.c:252:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&attr, 0, sizeof(attr));
--
^
drivers/mtd/chips/cfi_util.c:114:21: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
onecmd |= (onecmd << (chip_mode * 16));
^ ~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_util.c:117:21: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
onecmd |= (onecmd << (chip_mode * 8));
^
drivers/mtd/chips/cfi_util.c:307:6: note: Assuming 'adr' is not equal to 0
if (!adr)
^~~~
drivers/mtd/chips/cfi_util.c:307:2: note: Taking false branch
if (!adr)
^
drivers/mtd/chips/cfi_util.c:310:2: note: Loop condition is false. Exiting loop
printk(KERN_INFO "%s Extended Query Table@0x%4.4X\n", name, adr);
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/mtd/chips/cfi_util.c:313:6: note: Assuming 'extp' is non-null
if (!extp)
^~~~~
drivers/mtd/chips/cfi_util.c:313:2: note: Taking false branch
if (!extp)
^
drivers/mtd/chips/cfi_util.c:321:2: note: Calling 'cfi_qry_mode_on'
cfi_qry_mode_on(base, map, cfi);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_util.c:251:2: note: Calling 'cfi_send_gen_cmd'
cfi_send_gen_cmd(0xF0, 0, base, map, cfi, cfi->device_type, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_util.c:209:8: note: Calling 'cfi_build_cmd'
val = cfi_build_cmd(cmd, map, cfi);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_util.c:78:2: note: Taking false branch
if (map_bankwidth_is_large(map)) {
^
drivers/mtd/chips/cfi_util.c:91:2: note: Control jumps to 'case 4:' at line 99
switch (chip_mode) {
^
drivers/mtd/chips/cfi_util.c:100:12: note: '?' condition is true
onecmd = cpu_to_cfi32(map, cmd);
^
include/linux/mtd/cfi_endian.h:30:30: note: expanded from macro 'cpu_to_cfi32'
#define cpu_to_cfi32(map, x) _cpu_to_cfi(32, (map)->swap, (x))
^
include/linux/mtd/cfi_endian.h:36:31: note: expanded from macro '_cpu_to_cfi'
#define _cpu_to_cfi(w, s, x) (cfi_host(s)?(x):_swap_to_cfi(w, s, x))
^
include/linux/mtd/cfi_endian.h:25:22: note: expanded from macro 'cfi_host'
#define cfi_host(s) (cfi_default(s) == CFI_HOST_ENDIAN)
^
include/linux/mtd/cfi_endian.h:22:25: note: expanded from macro 'cfi_default'
#define cfi_default(s) ((s)?:CFI_DEFAULT_ENDIAN)
^
drivers/mtd/chips/cfi_util.c:100:12: note: Assuming the condition is true
onecmd = cpu_to_cfi32(map, cmd);
^
include/linux/mtd/cfi_endian.h:30:30: note: expanded from macro 'cpu_to_cfi32'
#define cpu_to_cfi32(map, x) _cpu_to_cfi(32, (map)->swap, (x))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/mtd/cfi_endian.h:36:31: note: expanded from macro '_cpu_to_cfi'
#define _cpu_to_cfi(w, s, x) (cfi_host(s)?(x):_swap_to_cfi(w, s, x))
^~~~~~~~~~~
include/linux/mtd/cfi_endian.h:25:22: note: expanded from macro 'cfi_host'
#define cfi_host(s) (cfi_default(s) == CFI_HOST_ENDIAN)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/mtd/cfi_endian.h:22:24: note: expanded from macro 'cfi_default'
#define cfi_default(s) ((s)?:CFI_DEFAULT_ENDIAN)
^
drivers/mtd/chips/cfi_util.c:100:12: note: '?' condition is true
onecmd = cpu_to_cfi32(map, cmd);
^
include/linux/mtd/cfi_endian.h:30:30: note: expanded from macro 'cpu_to_cfi32'
#define cpu_to_cfi32(map, x) _cpu_to_cfi(32, (map)->swap, (x))
^
include/linux/mtd/cfi_endian.h:36:31: note: expanded from macro '_cpu_to_cfi'
#define _cpu_to_cfi(w, s, x) (cfi_host(s)?(x):_swap_to_cfi(w, s, x))
^
include/linux/mtd/cfi_endian.h:25:21: note: expanded from macro 'cfi_host'
#define cfi_host(s) (cfi_default(s) == CFI_HOST_ENDIAN)
^
drivers/mtd/chips/cfi_util.c:101:3: note: Execution continues on line 106
break;
^
drivers/mtd/chips/cfi_util.c:106:2: note: Control jumps to 'case 2:' at line 116
switch (chips_per_word) {
^
drivers/mtd/chips/cfi_util.c:117:21: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
onecmd |= (onecmd << (chip_mode * 8));
^ ~~~~~~~~~~~~~~~
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/zl10036.c:488:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &zl10036_tuner_ops,
^~~~~~
drivers/media/dvb-frontends/zl10036.c:488:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &zl10036_tuner_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/cx22702.c:598:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &cx22702_ops,
^~~~~~
drivers/media/dvb-frontends/cx22702.c:598:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &cx22702_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/hwmon/occ/p8_i2c.c:76:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[1], &data[4], sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:76:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[1], &data[4], sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:77:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], data, sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:77:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], data, sizeof(u32));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:93:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &data0, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:93:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &data0, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:94:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 4, &data1, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:94:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 4, &data1, 4);
^~~~~~
drivers/hwmon/occ/p8_i2c.c:104:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data0, data, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:104:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data0, data, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:107:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data1, data + 4, min_t(size_t, len, 4));
^~~~~~
drivers/hwmon/occ/p8_i2c.c:107:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data1, data + 4, min_t(size_t, len, 4));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/media/dvb-core/dvb_ca_en50221.c:756:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ebuf, buf, bytes_read);
^~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:756:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ebuf, buf, bytes_read);
^~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:760:19: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
buf[0], (buf[1] & 0x80) == 0, bytes_read);
^
drivers/media/dvb-core/dvb_ca_en50221.c:1300:2: note: Assuming 'dvb_ca_en50221_debug' is 0
dprintk("%s\n", __func__);
^
drivers/media/dvb-core/dvb_ca_en50221.c:39:6: note: expanded from macro 'dprintk'
if (dvb_ca_en50221_debug) \
^~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:1300:2: note: Taking false branch
dprintk("%s\n", __func__);
^
drivers/media/dvb-core/dvb_ca_en50221.c:39:2: note: expanded from macro 'dprintk'
if (dvb_ca_en50221_debug) \
^
drivers/media/dvb-core/dvb_ca_en50221.c:1300:2: note: Loop condition is false. Exiting loop
dprintk("%s\n", __func__);
^
drivers/media/dvb-core/dvb_ca_en50221.c:38:30: note: expanded from macro 'dprintk'
#define dprintk(fmt, arg...) do { \
^
drivers/media/dvb-core/dvb_ca_en50221.c:1306:9: note: Assuming the condition is true
while (!kthread_should_stop()) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:1306:2: note: Loop condition is true. Entering loop body
while (!kthread_should_stop()) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:1308:7: note: Assuming field 'wakeup' is not equal to 0
if (!ca->wakeup) {
^~~~~~~~~~~
drivers/media/dvb-core/dvb_ca_en50221.c:1308:3: note: Taking false branch
if (!ca->wakeup) {
^
drivers/media/dvb-core/dvb_ca_en50221.c:1317:18: note: Assuming 'slot' is < field 'slot_count'
for (slot = 0; slot < ca->slot_count; slot++)
--
^
drivers/media/dvb-frontends/cx22700.c:83:2: note: Loop condition is false. Exiting loop
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:32:2: note: expanded from macro 'dprintk'
do { \
^
drivers/media/dvb-frontends/cx22700.c:87:6: note: Assuming 'ret' is not equal to 2
if (ret != 2) return -EIO;
^~~~~~~~
drivers/media/dvb-frontends/cx22700.c:87:2: note: Taking true branch
if (ret != 2) return -EIO;
^
drivers/media/dvb-frontends/cx22700.c:87:16: note: Returning the value -5
if (ret != 2) return -EIO;
^~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:288:9: note: Returning from 'cx22700_readreg'
| (cx22700_readreg (state, 0x0e) << 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:288:39: note: The result of the left shift is undefined because the left operand is negative
| (cx22700_readreg (state, 0x0e) << 1);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/cx22700.c:298:46: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
u16 rs_ber = (cx22700_readreg (state, 0x0d) << 9)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/cx22700.c:298:16: note: Calling 'cx22700_readreg'
u16 rs_ber = (cx22700_readreg (state, 0x0d) << 9)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:83:2: note: Assuming 'debug' is 0
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:33:7: note: expanded from macro 'dprintk'
if (debug) printk(KERN_DEBUG "cx22700: " args); \
^~~~~
drivers/media/dvb-frontends/cx22700.c:83:2: note: Taking false branch
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:33:3: note: expanded from macro 'dprintk'
if (debug) printk(KERN_DEBUG "cx22700: " args); \
^
drivers/media/dvb-frontends/cx22700.c:83:2: note: Loop condition is false. Exiting loop
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:32:2: note: expanded from macro 'dprintk'
do { \
^
drivers/media/dvb-frontends/cx22700.c:87:6: note: Assuming 'ret' is not equal to 2
if (ret != 2) return -EIO;
^~~~~~~~
drivers/media/dvb-frontends/cx22700.c:87:2: note: Taking true branch
if (ret != 2) return -EIO;
^
drivers/media/dvb-frontends/cx22700.c:87:16: note: Returning the value -5
if (ret != 2) return -EIO;
^~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:298:16: note: Returning from 'cx22700_readreg'
u16 rs_ber = (cx22700_readreg (state, 0x0d) << 9)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:298:46: note: The result of the left shift is undefined because the left operand is negative
u16 rs_ber = (cx22700_readreg (state, 0x0d) << 9)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/cx22700.c:299:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
| (cx22700_readreg (state, 0x0e) << 1);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/cx22700.c:299:9: note: Calling 'cx22700_readreg'
| (cx22700_readreg (state, 0x0e) << 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:83:2: note: Assuming 'debug' is 0
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:33:7: note: expanded from macro 'dprintk'
if (debug) printk(KERN_DEBUG "cx22700: " args); \
^~~~~
drivers/media/dvb-frontends/cx22700.c:83:2: note: Taking false branch
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:33:3: note: expanded from macro 'dprintk'
if (debug) printk(KERN_DEBUG "cx22700: " args); \
^
drivers/media/dvb-frontends/cx22700.c:83:2: note: Loop condition is false. Exiting loop
dprintk ("%s\n", __func__);
^
drivers/media/dvb-frontends/cx22700.c:32:2: note: expanded from macro 'dprintk'
do { \
^
drivers/media/dvb-frontends/cx22700.c:87:6: note: Assuming 'ret' is not equal to 2
if (ret != 2) return -EIO;
^~~~~~~~
drivers/media/dvb-frontends/cx22700.c:87:2: note: Taking true branch
if (ret != 2) return -EIO;
^
drivers/media/dvb-frontends/cx22700.c:87:16: note: Returning the value -5
if (ret != 2) return -EIO;
^~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:299:9: note: Returning from 'cx22700_readreg'
| (cx22700_readreg (state, 0x0e) << 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cx22700.c:299:39: note: The result of the left shift is undefined because the left operand is negative
| (cx22700_readreg (state, 0x0e) << 1);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
>> drivers/media/dvb-frontends/cx22700.c:390:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &cx22700_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/cx22700.c:390:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &cx22700_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/nvme/target/io-cmd-file.c:166:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&req->f.iocb, 0, sizeof(struct kiocb));
^~~~~~
drivers/nvme/target/io-cmd-file.c:166:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&req->f.iocb, 0, sizeof(struct kiocb));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/nvme/target/passthru.c:106:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(id->subnqn, ctrl->subsysnqn, sizeof(id->subnqn));
^~~~~~
drivers/nvme/target/passthru.c:106:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(id->subnqn, ctrl->subsysnqn, sizeof(id->subnqn));
^~~~~~
drivers/nvme/target/passthru.c:144:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&id->lbaf[i], 0, sizeof(id->lbaf[i]));
^~~~~~
drivers/nvme/target/passthru.c:144:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&id->lbaf[i], 0, sizeof(id->lbaf[i]));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
include/linux/blkdev.h:522:16: warning: The result of the right shift is undefined because the right operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
return sector >> ilog2(q->limits.chunk_sectors);
^
drivers/nvme/target/zns.c:467:26: note: Calling 'bdev_zone_sectors'
sector_t zone_sectors = bdev_zone_sectors(bdev);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:1118:6: note: Assuming 'q' is non-null
if (q)
^
include/linux/blkdev.h:1118:2: note: Taking true branch
if (q)
^
include/linux/blkdev.h:1119:10: note: Calling 'blk_queue_zone_sectors'
return blk_queue_zone_sectors(q);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:508:9: note: Calling 'blk_queue_is_zoned'
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Calling 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:490:2: note: Taking true branch
if (IS_ENABLED(CONFIG_BLK_DEV_ZONED))
^
include/linux/blkdev.h:491:3: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return q->limits.zoned;
^
include/linux/blkdev.h:497:10: note: Returning from 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:2: note: Control jumps to 'case BLK_ZONED_HM:' at line 499
switch (blk_queue_zoned_model(q)) {
^
include/linux/blkdev.h:500:3: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return true;
^
include/linux/blkdev.h:508:9: note: Returning from 'blk_queue_is_zoned'
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:508:9: note: '?' condition is true
include/linux/blkdev.h:508:2: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^
include/linux/blkdev.h:1119:10: note: Returning from 'blk_queue_zone_sectors'
return blk_queue_zone_sectors(q);
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/zns.c:467:26: note: Returning from 'bdev_zone_sectors'
sector_t zone_sectors = bdev_zone_sectors(bdev);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/zns.c:471:6: note: 'op' is not equal to REQ_OP_LAST
if (op == REQ_OP_LAST) {
^~
drivers/nvme/target/zns.c:471:2: note: Taking false branch
if (op == REQ_OP_LAST) {
^
drivers/nvme/target/zns.c:478:6: note: Assuming field 'select_all' is not equal to 0
if (req->cmd->zms.select_all) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/zns.c:478:2: note: Taking true branch
if (req->cmd->zms.select_all) {
^
drivers/nvme/target/zns.c:479:12: note: Calling 'nvmet_bdev_execute_zmgmt_send_all'
status = nvmet_bdev_execute_zmgmt_send_all(req);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/zns.c:440:2: note: Control jumps to 'case REQ_OP_ZONE_FINISH:' at line 450
--
^~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1850:2: note: Taking false branch
if (pdev->dev.of_node)
^
drivers/dma/ti/omap-dma.c:1858:6: note: Assuming field 'legacy' is true
if (!od->legacy) {
^~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1858:2: note: Taking false branch
if (!od->legacy) {
^
drivers/dma/ti/omap-dma.c:1863:6: note: Assuming field 'll123_supported' is false
if (od->ll123_supported)
^~~~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1863:2: note: Taking false branch
if (od->ll123_supported)
^
drivers/dma/ti/omap-dma.c:1866:2: note: Calling 'omap_dma_free'
omap_dma_free(od);
^~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1515:2: note: Loop condition is true. Entering loop body
while (!list_empty(&od->ddev.channels)) {
^
drivers/dma/ti/omap-dma.c:1521:3: note: Memory is released
kfree(c);
^~~~~~~~
drivers/dma/ti/omap-dma.c:1515:2: note: Loop condition is true. Entering loop body
while (!list_empty(&od->ddev.channels)) {
^
drivers/dma/ti/omap-dma.c:1519:3: note: Calling 'list_del'
list_del(&c->vc.chan.device_node);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:148:2: note: Calling '__list_del_entry'
__list_del_entry(entry);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:6: note: Assuming the condition is false
if (!__list_del_entry_valid(entry))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:2: note: Taking false branch
if (!__list_del_entry_valid(entry))
^
include/linux/list.h:137:13: note: Use of memory after it is freed
__list_del(entry->prev, entry->next);
^~~~~~~~~~~
include/linux/list.h:149:14: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
entry->next = LIST_POISON1;
^
drivers/dma/ti/omap-dma.c:1847:6: note: Assuming field 'may_lose_context' is 0
if (od->cfg->may_lose_context)
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1847:2: note: Taking false branch
if (od->cfg->may_lose_context)
^
drivers/dma/ti/omap-dma.c:1850:6: note: Assuming field 'of_node' is null
if (pdev->dev.of_node)
^~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1850:2: note: Taking false branch
if (pdev->dev.of_node)
^
drivers/dma/ti/omap-dma.c:1858:6: note: Assuming field 'legacy' is true
if (!od->legacy) {
^~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1858:2: note: Taking false branch
if (!od->legacy) {
^
drivers/dma/ti/omap-dma.c:1863:6: note: Assuming field 'll123_supported' is false
if (od->ll123_supported)
^~~~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1863:2: note: Taking false branch
if (od->ll123_supported)
^
drivers/dma/ti/omap-dma.c:1866:2: note: Calling 'omap_dma_free'
omap_dma_free(od);
^~~~~~~~~~~~~~~~~
drivers/dma/ti/omap-dma.c:1515:2: note: Loop condition is true. Entering loop body
while (!list_empty(&od->ddev.channels)) {
^
drivers/dma/ti/omap-dma.c:1521:3: note: Memory is released
kfree(c);
^~~~~~~~
drivers/dma/ti/omap-dma.c:1515:2: note: Loop condition is true. Entering loop body
while (!list_empty(&od->ddev.channels)) {
^
drivers/dma/ti/omap-dma.c:1519:3: note: Calling 'list_del'
list_del(&c->vc.chan.device_node);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/mtd/nand/raw/ams-delta.c:199:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &nand_to_mtd(this)->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/ams-delta.c:199:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &nand_to_mtd(this)->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> drivers/mtd/nand/raw/denali.c:618:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xff, size);
^~~~~~
drivers/mtd/nand/raw/denali.c:618:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xff, size);
^~~~~~
drivers/mtd/nand/raw/denali.c:705:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xff, size);
^~~~~~
drivers/mtd/nand/raw/denali.c:705:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xff, size);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/mtd/nand/raw/s3c2410.c:1130:2: warning: Value stored to 'size' is never read [clang-analyzer-deadcode.DeadStores]
size = resource_size(res);
^ ~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/s3c2410.c:1130:2: note: Value stored to 'size' is never read
size = resource_size(res);
^ ~~~~~~~~~~~~~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
drivers/mtd/nand/raw/diskonchip.c:142:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(syn, 0, sizeof(syn));
^~~~~~
drivers/mtd/nand/raw/diskonchip.c:142:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(syn, 0, sizeof(syn));
^~~~~~
drivers/mtd/nand/raw/diskonchip.c:371:20: warning: The left operand of '<<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
ret = ((u16)id[0] << 8) | id[1];
^
drivers/mtd/nand/raw/diskonchip.c:1548:6: note: Assuming 'doc_config_location' is not equal to 0
if (doc_config_location) {
^~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1548:2: note: Taking true branch
if (doc_config_location) {
^
drivers/mtd/nand/raw/diskonchip.c:1549:3: note: Loop condition is false. Exiting loop
pr_info("Using configured DiskOnChip probe address 0x%lx\n",
^
include/linux/printk.h:519:2: note: expanded from macro 'pr_info'
printk(KERN_INFO pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/mtd/nand/raw/diskonchip.c:1551:9: note: Calling 'doc_probe'
ret = doc_probe(doc_config_location);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1311:6: note: Assuming the condition is false
if (!request_mem_region(physadr, DOC_IOREMAP_LEN, "DiskOnChip"))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1311:2: note: Taking false branch
if (!request_mem_region(physadr, DOC_IOREMAP_LEN, "DiskOnChip"))
^
drivers/mtd/nand/raw/diskonchip.c:1314:6: note: Assuming 'virtadr' is non-null
if (!virtadr) {
^~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1314:2: note: Taking false branch
if (!virtadr) {
^
drivers/mtd/nand/raw/diskonchip.c:1341:2: note: Control jumps to 'case 32:' @line 1342
switch (ChipID) {
^
drivers/mtd/nand/raw/diskonchip.c:1344:3: note: Execution continues on line 1388
break;
^
drivers/mtd/nand/raw/diskonchip.c:1391:7: note: Assuming 'tmp' is not equal to 'tmpb'
if ((tmp == tmpb) || (tmp != tmpc)) {
^~~~~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1391:6: note: Left side of '||' is false
if ((tmp == tmpb) || (tmp != tmpc)) {
^
drivers/mtd/nand/raw/diskonchip.c:1391:24: note: Assuming 'tmp' is equal to 'tmpc'
if ((tmp == tmpb) || (tmp != tmpc)) {
^~~~~~~~~~~
drivers/mtd/nand/raw/diskonchip.c:1391:2: note: Taking false branch
if ((tmp == tmpb) || (tmp != tmpc)) {
^
drivers/mtd/nand/raw/diskonchip.c:1397:2: note: Loop condition is false. Execution continues on line 1432
for (mtd = doclist; mtd; mtd = doc->nextdoc) {
^
drivers/mtd/nand/raw/diskonchip.c:1432:2: note: Loop condition is false. Exiting loop
pr_notice("DiskOnChip found at 0x%lx\n", physadr);
^
include/linux/printk.h:509:2: note: expanded from macro 'pr_notice'
printk(KERN_NOTICE pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
--
^
drivers/base/regmap/regmap.c:1526:11: note: Taking false branch
async = list_first_entry_or_null(&map->async_free,
^
include/linux/list.h:554:28: note: expanded from macro 'list_first_entry_or_null'
struct list_head *pos__ = READ_ONCE(head__->next); \
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:2: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
drivers/base/regmap/regmap.c:1526:11: note: Loop condition is false. Exiting loop
async = list_first_entry_or_null(&map->async_free,
^
include/linux/list.h:554:28: note: expanded from macro 'list_first_entry_or_null'
struct list_head *pos__ = READ_ONCE(head__->next); \
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:2: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
drivers/base/regmap/regmap.c:1526:11: note: Assuming 'pos__' is not equal to 'head__'
async = list_first_entry_or_null(&map->async_free,
^
include/linux/list.h:555:2: note: expanded from macro 'list_first_entry_or_null'
pos__ != head__ ? list_entry(pos__, type, member) : NULL; \
^~~~~~~~~~~~~~~
drivers/base/regmap/regmap.c:1526:11: note: '?' condition is true
async = list_first_entry_or_null(&map->async_free,
^
include/linux/list.h:555:2: note: expanded from macro 'list_first_entry_or_null'
pos__ != head__ ? list_entry(pos__, type, member) : NULL; \
^
drivers/base/regmap/regmap.c:1529:3: note: Calling 'list_del'
list_del(&async->list);
^~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/i2c/saa6588.c:157:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &s->buffer[s->rd_index], 3);
^~~~~~
drivers/media/i2c/saa6588.c:157:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &s->buffer[s->rd_index], 3);
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/media/i2c/tda1997x.c:1037:2: warning: Value stored to 'reg' is never read [clang-analyzer-deadcode.DeadStores]
reg = io_write(sd, REG_RATE_CTRL, reg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:1037:2: note: Value stored to 'reg' is never read
reg = io_write(sd, REG_RATE_CTRL, reg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:1520:3: warning: Value stored to 'source' is never read [clang-analyzer-deadcode.DeadStores]
source &= ~MASK_AVI_IF;
^ ~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:1520:3: note: Value stored to 'source' is never read
source &= ~MASK_AVI_IF;
^ ~~~~~~~~~~~~
>> drivers/media/i2c/tda1997x.c:1717:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(timings, 0, sizeof(struct v4l2_dv_timings));
^~~~~~
drivers/media/i2c/tda1997x.c:1717:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(timings, 0, sizeof(struct v4l2_dv_timings));
^~~~~~
drivers/media/i2c/tda1997x.c:1772:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(format, 0, sizeof(*format));
^~~~~~
drivers/media/i2c/tda1997x.c:1772:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(format, 0, sizeof(*format));
^~~~~~
drivers/media/i2c/tda1997x.c:1849:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(edid->reserved, 0, sizeof(edid->reserved));
^~~~~~
drivers/media/i2c/tda1997x.c:1849:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(edid->reserved, 0, sizeof(edid->reserved));
^~~~~~
>> drivers/media/i2c/tda1997x.c:1865:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(edid->edid, state->edid.edid + edid->start_block * 128,
^~~~~~
drivers/media/i2c/tda1997x.c:1865:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(edid->edid, state->edid.edid + edid->start_block * 128,
^~~~~~
drivers/media/i2c/tda1997x.c:1877:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(edid->reserved, 0, sizeof(edid->reserved));
^~~~~~
drivers/media/i2c/tda1997x.c:1877:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(edid->reserved, 0, sizeof(edid->reserved));
^~~~~~
drivers/media/i2c/tda1997x.c:1905:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->edid.edid, edid->edid, 256);
^~~~~~
drivers/media/i2c/tda1997x.c:1905:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->edid.edid, edid->edid, 256);
^~~~~~
drivers/media/i2c/tda1997x.c:2123:2: warning: Value stored to 'reg' is never read [clang-analyzer-deadcode.DeadStores]
reg = io_read(sd, REG_VERSION);
^ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:2123:2: note: Value stored to 'reg' is never read
reg = io_read(sd, REG_VERSION);
^ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:2125:2: warning: Value stored to 'reg' is never read [clang-analyzer-deadcode.DeadStores]
reg = io_read(sd, REG_CMTP_REG10);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/tda1997x.c:2125:2: note: Value stored to 'reg' is never read
reg = io_read(sd, REG_CMTP_REG10);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/media/i2c/tda1997x.c:2592:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sd->name, sizeof(sd->name), "%s %d-%04x",
^~~~~~~~
drivers/media/i2c/tda1997x.c:2592:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sd->name, sizeof(sd->name), "%s %d-%04x",
^~~~~~~~
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
fs/dcache.c:320:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name->inline_name, dentry->d_iname,
^~~~~~
fs/dcache.c:320:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name->inline_name, dentry->d_iname,
^~~~~~
fs/dcache.c:1800:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dname, name->name, name->len);
^~~~~~
fs/dcache.c:1800:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dname, name->name, name->len);
^~~~~~
fs/dcache.c:2824:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target->d_iname, dentry->d_name.name,
^~~~~~
fs/dcache.c:2824:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target->d_iname, dentry->d_name.name,
^~~~~~
fs/dcache.c:2835:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dentry->d_iname, target->d_name.name,
^~~~~~
fs/dcache.c:2835:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dentry->d_iname, target->d_name.name,
^~~~~~
fs/dcache.c:2863:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dentry->d_iname, target->d_name.name,
^~~~~~
fs/dcache.c:2863:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dentry->d_iname, target->d_name.name,
^~~~~~
fs/dcache.c:3203:23: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
dentry->d_name.len = sprintf(dentry->d_iname, "#%llu",
^~~~~~~
fs/dcache.c:3203:23: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
dentry->d_name.len = sprintf(dentry->d_iname, "#%llu",
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
drivers/pcmcia/pcmcia_cis.c:358:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(*get->buf, tuple->TupleData, tuple->TupleDataLen);
^~~~~~
drivers/pcmcia/pcmcia_cis.c:358:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(*get->buf, tuple->TupleData, tuple->TupleDataLen);
^~~~~~
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
drivers/input/serio/serio.c:347:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:347:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:354:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:354:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:367:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:367:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:373:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:373:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:379:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:379:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:416:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:416:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
--
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/hwmon/max6621.c:323:10: note: Calling 'max6621_temp_mc2reg'
val = max6621_temp_mc2reg(val);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/max6621.c:135:23: note: The result of the left shift is undefined because the left operand is negative
return (val / 1000L) << MAX6621_REG_TEMP_SHIFT;
~~~~~~~~~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/media/i2c/ad9389b.c:399:7: warning: Value stored to 'N' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
u32 N = (ad9389b_rd(sd, 0x01) & 0xf) << 16 |
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ad9389b.c:399:7: note: Value stored to 'N' during its initialization is never read
u32 N = (ad9389b_rd(sd, 0x01) & 0xf) << 16 |
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/i2c/ad9389b.c:680:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(edid->edid, &state->edid.data[edid->start_block * 128],
^~~~~~
drivers/media/i2c/ad9389b.c:680:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(edid->edid, &state->edid.data[edid->start_block * 128],
^~~~~~
drivers/media/i2c/ad9389b.c:801:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(bp, "0x%02x, ", buf[j]);
^~~~~~~
drivers/media/i2c/ad9389b.c:801:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(bp, "0x%02x, ", buf[j]);
^~~~~~~
drivers/media/i2c/ad9389b.c:928:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state->edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:928:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state->edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:960:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state->edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:960:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state->edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:1078:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:1078:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(edid, 0, sizeof(struct ad9389b_state_edid));
^~~~~~
drivers/media/i2c/ad9389b.c:1108:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->pdata, pdata, sizeof(state->pdata));
^~~~~~
drivers/media/i2c/ad9389b.c:1108:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->pdata, pdata, sizeof(state->pdata));
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/dvb-frontends/drxd_hard.c:858:9: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
Value &= FE_AG_REG_GC1_AGC_DAT__M;
^
drivers/media/dvb-frontends/drxd_hard.c:2761:8: note: Calling 'ReadIFAgc'
res = ReadIFAgc(state, &value);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/drxd_hard.c:855:6: note: Assuming field 'ctrlMode' is not equal to AGC_CTRL_OFF
if (state->if_agc_cfg.ctrlMode != AGC_CTRL_OFF) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/drxd_hard.c:855:2: note: Taking true branch
if (state->if_agc_cfg.ctrlMode != AGC_CTRL_OFF) {
^
drivers/media/dvb-frontends/drxd_hard.c:856:3: note: 'Value' declared without an initial value
u16 Value;
^~~~~~~~~
drivers/media/dvb-frontends/drxd_hard.c:857:12: note: Calling 'Read16'
status = Read16(state, FE_AG_REG_GC1_AGC_DAT__A, &Value, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/drxd_hard.c:232:2: note: Taking true branch
if (i2c_read(state->i2c, adr, mm1, 4, mm2, 2) < 0)
^
drivers/media/dvb-frontends/drxd_hard.c:233:3: note: Returning without writing to '*data'
return -1;
^
drivers/media/dvb-frontends/drxd_hard.c:857:12: note: Returning from 'Read16'
status = Read16(state, FE_AG_REG_GC1_AGC_DAT__A, &Value, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/drxd_hard.c:858:9: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
Value &= FE_AG_REG_GC1_AGC_DAT__M;
~~~~~ ^
drivers/media/dvb-frontends/drxd_hard.c:2259:4: warning: Value stored to 'operationMode' is never read [clang-analyzer-deadcode.DeadStores]
operationMode |= SC_RA_RAM_OP_AUTO_RATE__M;
^
drivers/media/dvb-frontends/drxd_hard.c:2259:4: note: Value stored to 'operationMode' is never read
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/tda10023.c:527:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &tda10023_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/tda10023.c:527:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &tda10023_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/dvb-frontends/stv0297.c:128:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
| (stv0297_readreg(state, 0x56) << 8)
^
drivers/media/dvb-frontends/stv0297.c:616:18: note: Assuming the condition is false
p->inversion = (reg_83 & 0x08) ? INVERSION_ON : INVERSION_OFF;
^~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:616:17: note: '?' condition is false
p->inversion = (reg_83 & 0x08) ? INVERSION_ON : INVERSION_OFF;
^
drivers/media/dvb-frontends/stv0297.c:617:6: note: Assuming field 'invert' is 0
if (state->config->invert)
^~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:617:2: note: Taking false branch
if (state->config->invert)
^
drivers/media/dvb-frontends/stv0297.c:619:19: note: Calling 'stv0297_get_symbolrate'
p->symbol_rate = stv0297_get_symbolrate(state) * 1000;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:128:10: note: Calling 'stv0297_readreg'
| (stv0297_readreg(state, 0x56) << 8)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:64:21: note: Field 'stop_during_read' is 0
if (state->config->stop_during_read) {
^
drivers/media/dvb-frontends/stv0297.c:64:2: note: Taking false branch
if (state->config->stop_during_read) {
^
drivers/media/dvb-frontends/stv0297.c:74:7: note: Assuming the condition is true
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:74:3: note: Taking true branch
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^
drivers/media/dvb-frontends/stv0297.c:75:4: note: Loop condition is false. Exiting loop
dprintk("%s: readreg error (reg == 0x%02x, ret == %i)\n", __func__, reg, ret);
^
drivers/media/dvb-frontends/stv0297.c:31:23: note: expanded from macro 'dprintk'
#define dprintk(x...) printk(x)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/media/dvb-frontends/stv0297.c:76:4: note: Returning the value -1
return -1;
^~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:128:10: note: Returning from 'stv0297_readreg'
| (stv0297_readreg(state, 0x56) << 8)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:128:39: note: The result of the left shift is undefined because the left operand is negative
| (stv0297_readreg(state, 0x56) << 8)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/stv0297.c:129:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
| (stv0297_readreg(state, 0x57) << 16)
^
drivers/media/dvb-frontends/stv0297.c:616:18: note: Assuming the condition is false
p->inversion = (reg_83 & 0x08) ? INVERSION_ON : INVERSION_OFF;
^~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:616:17: note: '?' condition is false
p->inversion = (reg_83 & 0x08) ? INVERSION_ON : INVERSION_OFF;
^
drivers/media/dvb-frontends/stv0297.c:617:6: note: Assuming field 'invert' is 0
if (state->config->invert)
^~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:617:2: note: Taking false branch
if (state->config->invert)
^
drivers/media/dvb-frontends/stv0297.c:619:19: note: Calling 'stv0297_get_symbolrate'
p->symbol_rate = stv0297_get_symbolrate(state) * 1000;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:129:10: note: Calling 'stv0297_readreg'
| (stv0297_readreg(state, 0x57) << 16)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:64:21: note: Field 'stop_during_read' is 0
if (state->config->stop_during_read) {
^
drivers/media/dvb-frontends/stv0297.c:64:2: note: Taking false branch
if (state->config->stop_during_read) {
^
drivers/media/dvb-frontends/stv0297.c:74:7: note: Assuming the condition is true
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0297.c:74:3: note: Taking true branch
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^
drivers/media/dvb-frontends/stv0297.c:75:4: note: Loop condition is false. Exiting loop
dprintk("%s: readreg error (reg == 0x%02x, ret == %i)\n", __func__, reg, ret);
--
^
drivers/hwmon/pmbus/zl6100.c:118:6: note: 'negative' is false
if (negative)
^~~~~~~~
drivers/hwmon/pmbus/zl6100.c:118:2: note: Taking false branch
if (negative)
^
drivers/hwmon/pmbus/zl6100.c:122:41: note: The result of the left shift is undefined because the left operand is negative
return (mantissa & 0x7ff) | ((exponent << 11) & 0xf800);
~~~~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
fs/pstore/ram.c:149:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:149:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:157:13: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
fs/pstore/ram.c:157:13: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
fs/pstore/ram.c:276:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
fs/pstore/ram.c:276:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
fs/pstore/ram.c:728:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:728:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:920:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdata, 0, sizeof(pdata));
^~~~~~
fs/pstore/ram.c:920:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdata, 0, sizeof(pdata));
^~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/i2c/i2c-mux.c:328:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(priv->adap.name, sizeof(priv->adap.name),
^~~~~~~~
drivers/i2c/i2c-mux.c:328:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(priv->adap.name, sizeof(priv->adap.name),
^~~~~~~~
drivers/i2c/i2c-mux.c:424:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(symlink_name, sizeof(symlink_name), "channel-%u", chan_id);
^~~~~~~~
drivers/i2c/i2c-mux.c:424:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(symlink_name, sizeof(symlink_name), "channel-%u", chan_id);
^~~~~~~~
drivers/i2c/i2c-mux.c:451:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(symlink_name, sizeof(symlink_name),
^~~~~~~~
drivers/i2c/i2c-mux.c:451:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(symlink_name, sizeof(symlink_name),
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/i2c/algos/i2c-algo-pcf.c:322:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = pcf_doAddress(adap, pmsg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i2c/algos/i2c-algo-pcf.c:322:3: note: Value stored to 'ret' is never read
ret = pcf_doAddress(adap, pmsg);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/dvb-frontends/s5h1432.c:207:4: warning: Value stored to 'dvb_bandwidth' is never read [clang-analyzer-deadcode.DeadStores]
dvb_bandwidth = 6;
^ ~
drivers/media/dvb-frontends/s5h1432.c:207:4: note: Value stored to 'dvb_bandwidth' is never read
dvb_bandwidth = 6;
^ ~
drivers/media/dvb-frontends/s5h1432.c:211:4: warning: Value stored to 'dvb_bandwidth' is never read [clang-analyzer-deadcode.DeadStores]
dvb_bandwidth = 7;
^ ~
drivers/media/dvb-frontends/s5h1432.c:211:4: note: Value stored to 'dvb_bandwidth' is never read
dvb_bandwidth = 7;
^ ~
drivers/media/dvb-frontends/s5h1432.c:215:4: warning: Value stored to 'dvb_bandwidth' is never read [clang-analyzer-deadcode.DeadStores]
dvb_bandwidth = 8;
^ ~
drivers/media/dvb-frontends/s5h1432.c:215:4: note: Value stored to 'dvb_bandwidth' is never read
dvb_bandwidth = 8;
^ ~
>> drivers/media/dvb-frontends/s5h1432.c:351:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s5h1432_ops,
^~~~~~
drivers/media/dvb-frontends/s5h1432.c:351:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s5h1432_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/cx24110.c:606:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &cx24110_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/cx24110.c:606:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &cx24110_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
fs/xfs/libxfs/xfs_dir2_leaf.c:314:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(leaf3, 0, sizeof(*leaf3));
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:314:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(leaf3, 0, sizeof(*leaf3));
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:323:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(leaf, 0, sizeof(*leaf));
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:323:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(leaf, 0, sizeof(*leaf));
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:440:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(leafhdr.ents, blp,
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:440:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(leafhdr.ents, blp,
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:536:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(lep + 1, lep,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:536:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(lep + 1, lep,
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:575:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ents[lowstale], &ents[lowstale + 1],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:575:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ents[lowstale], &ents[lowstale + 1],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:596:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ents[index + 1], &ents[index],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:596:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ents[index + 1], &ents[index],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:810:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&bestsp[0], &bestsp[1],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:810:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&bestsp[0], &bestsp[1],
^~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:864:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dep->name, args->name, dep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:864:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dep->name, args->name, dep->namelen);
^~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1285:43: warning: Access to field 'b_addr' results in a dereference of a null pointer (loaded from variable 'dbp') [clang-analyzer-core.NullDereference]
dep = (xfs_dir2_data_entry_t *)((char *)dbp->b_addr +
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1506:10: note: Calling 'xfs_dir2_leaf_lookup_int'
error = xfs_dir2_leaf_lookup_int(args, &lbp, &index, &dbp, &leafhdr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1217:2: note: 'dbp' initialized to a null pointer value
struct xfs_buf *dbp = NULL; /* data buffer */
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1235:10: note: Calling 'xfs_dir3_leaf_read'
error = xfs_dir3_leaf_read(tp, dp, args->geo->leafblk, &lbp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:275:6: note: Assuming 'err' is 0, which participates in a condition later
if (!err && tp && *bpp)
^~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:275:6: note: Left side of '&&' is true
fs/xfs/libxfs/xfs_dir2_leaf.c:275:14: note: Assuming 'tp' is null
if (!err && tp && *bpp)
^~
fs/xfs/libxfs/xfs_dir2_leaf.c:275:17: note: Left side of '&&' is false
if (!err && tp && *bpp)
^
fs/xfs/libxfs/xfs_dir2_leaf.c:277:2: note: Returning zero (loaded from 'err'), which participates in a condition later
return err;
^~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1235:10: note: Returning from 'xfs_dir3_leaf_read'
error = xfs_dir3_leaf_read(tp, dp, args->geo->leafblk, &lbp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1236:6: note: 'error' is 0
if (error)
^~~~~
fs/xfs/libxfs/xfs_dir2_leaf.c:1236:2: note: Taking false branch
if (error)
^
fs/xfs/libxfs/xfs_dir2_leaf.c:1253:7: note: Assuming 'index' is < field 'count'
--
^
drivers/hwmon/tmp513.c:679:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data->nfactor, nfactor, (data->id == tmp513) ? 3 : 2);
^~~~~~
drivers/hwmon/tmp513.c:679:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data->nfactor, nfactor, (data->id == tmp513) ? 3 : 2);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
block/partitions/core.c:140:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:140:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:141:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:141:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:143:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:143:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:147:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->parts, 0, state->limit * sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:147:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->parts, 0, state->limit * sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:192:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:192:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:198:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:198:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:206:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:206:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
drivers/leds/trigger/ledtrig-transient.c:48:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", transient_data->activate);
^~~~~~~
drivers/leds/trigger/ledtrig-transient.c:48:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", transient_data->activate);
^~~~~~~
drivers/leds/trigger/ledtrig-transient.c:100:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", transient_data->duration);
^~~~~~~
drivers/leds/trigger/ledtrig-transient.c:100:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", transient_data->duration);
^~~~~~~
drivers/leds/trigger/ledtrig-transient.c:127:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", state);
^~~~~~~
drivers/leds/trigger/ledtrig-transient.c:127:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", state);
^~~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
drivers/leds/trigger/ledtrig-pattern.c:230:12: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ccount = sscanf(buf + offset, "%u %u %n",
^~~~~~
drivers/leds/trigger/ledtrig-pattern.c:230:12: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ccount = sscanf(buf + offset, "%u %u %n",
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/media/dvb-frontends/stv6111.c:325:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&d[1], &state->reg[reg], len);
^~~~~~
drivers/media/dvb-frontends/stv6111.c:325:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&d[1], &state->reg[reg], len);
^~~~~~
drivers/media/dvb-frontends/stv6111.c:464:2: warning: Value stored to 'icp' is never read [clang-analyzer-deadcode.DeadStores]
icp = 0;
^ ~
drivers/media/dvb-frontends/stv6111.c:464:2: note: Value stored to 'icp' is never read
icp = 0;
^ ~
drivers/media/dvb-frontends/stv6111.c:661:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/dvb-frontends/stv6111.c:661:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
>> drivers/media/dvb-frontends/mxl5xx.c:230:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[6], reg_data_ptr, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:230:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[6], reg_data_ptr, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:412:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_ABORT_TUNE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:412:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_ABORT_TUNE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:482:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_DEMOD_SET_PARAM_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:482:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_DEMOD_SET_PARAM_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:552:35: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
p->pre_bit_error.stat[0].uvalue = reg[2];
^
drivers/media/dvb-frontends/mxl5xx.c:656:6: note: Assuming 're_tune' is false
if (re_tune) {
^~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:656:2: note: Taking false branch
if (re_tune) {
^
drivers/media/dvb-frontends/mxl5xx.c:663:9: note: Calling 'read_status'
return read_status(fe, status);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:624:13: note: Assuming 'reg_data' is equal to 1
*status = (reg_data == 1) ? 0x1f : 0;
^~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:624:12: note: '?' condition is true
*status = (reg_data == 1) ? 0x1f : 0;
^
drivers/media/dvb-frontends/mxl5xx.c:629:2: note: Calling 'read_signal_strength'
read_signal_strength(fe);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:607:2: note: Returning without writing to 'fe->dtv_property_cache.delivery_system', which participates in a condition later
return stat;
^
drivers/media/dvb-frontends/mxl5xx.c:629:2: note: Returning from 'read_signal_strength'
read_signal_strength(fe);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:631:2: note: Taking true branch
if (*status & FE_HAS_CARRIER)
^
drivers/media/dvb-frontends/mxl5xx.c:632:3: note: Calling 'read_snr'
read_snr(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:530:2: note: Returning without writing to 'fe->dtv_property_cache.delivery_system', which participates in a condition later
return stat;
^
drivers/media/dvb-frontends/mxl5xx.c:632:3: note: Returning from 'read_snr'
read_snr(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:636:2: note: Taking true branch
if (*status & FE_HAS_SYNC)
^
drivers/media/dvb-frontends/mxl5xx.c:637:3: note: Calling 'read_ber'
read_ber(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:541:2: note: Calling 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:279:7: note: 'stat' is -1
if (!stat) {
^~~~
drivers/media/dvb-frontends/mxl5xx.c:279:2: note: Taking false branch
if (!stat) {
^
drivers/media/dvb-frontends/mxl5xx.c:541:2: note: Returning from 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:548:2: note: Control jumps to 'case SYS_DVBS:' at line 550
switch (p->delivery_system) {
^
drivers/media/dvb-frontends/mxl5xx.c:552:35: note: Assigned value is garbage or undefined
p->pre_bit_error.stat[0].uvalue = reg[2];
^ ~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:576:36: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
p->post_bit_error.stat[0].uvalue = reg[1];
^
drivers/media/dvb-frontends/mxl5xx.c:656:6: note: Assuming 're_tune' is false
if (re_tune) {
^~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:656:2: note: Taking false branch
if (re_tune) {
--
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:530:2: note: Returning without writing to 'fe->dtv_property_cache.delivery_system', which participates in a condition later
return stat;
^
drivers/media/dvb-frontends/mxl5xx.c:632:3: note: Returning from 'read_snr'
read_snr(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:636:2: note: Taking true branch
if (*status & FE_HAS_SYNC)
^
drivers/media/dvb-frontends/mxl5xx.c:637:3: note: Calling 'read_ber'
read_ber(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:541:2: note: Calling 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:279:7: note: 'stat' is -1
if (!stat) {
^~~~
drivers/media/dvb-frontends/mxl5xx.c:279:2: note: Taking false branch
if (!stat) {
^
drivers/media/dvb-frontends/mxl5xx.c:541:2: note: Returning from 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:548:2: note: Control jumps to the 'default' case at line 556
switch (p->delivery_system) {
^
drivers/media/dvb-frontends/mxl5xx.c:557:3: note: Execution continues on line 560
break;
^
drivers/media/dvb-frontends/mxl5xx.c:560:2: note: Calling 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:279:7: note: 'stat' is -1
if (!stat) {
^~~~
drivers/media/dvb-frontends/mxl5xx.c:279:2: note: Taking false branch
if (!stat) {
^
drivers/media/dvb-frontends/mxl5xx.c:560:2: note: Returning from 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:566:2: note: Control jumps to 'case SYS_DVBS2:' at line 574
switch (p->delivery_system) {
^
drivers/media/dvb-frontends/mxl5xx.c:576:36: note: Assigned value is garbage or undefined
p->post_bit_error.stat[0].uvalue = reg[1];
^ ~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:705:17: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
p->symbol_rate = reg_data[DMD_SYMBOL_RATE_ADDR];
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:688:2: note: Calling 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:279:7: note: 'stat' is -1
if (!stat) {
^~~~
drivers/media/dvb-frontends/mxl5xx.c:279:2: note: Taking false branch
if (!stat) {
^
drivers/media/dvb-frontends/mxl5xx.c:688:2: note: Returning from 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:702:2: note: Taking false branch
dev_dbg(state->i2cdev, "freq=%u delsys=%u srate=%u\n",
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/media/dvb-frontends/mxl5xx.c:705:17: note: Assigned value is garbage or undefined
p->symbol_rate = reg_data[DMD_SYMBOL_RATE_ADDR];
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:706:15: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
p->frequency = freq;
^ ~~~~
drivers/media/dvb-frontends/mxl5xx.c:684:2: note: 'freq' declared without an initial value
u32 freq;
^~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:694:2: note: Calling 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:279:7: note: 'stat' is -1
if (!stat) {
^~~~
drivers/media/dvb-frontends/mxl5xx.c:279:2: note: Taking false branch
if (!stat) {
^
drivers/media/dvb-frontends/mxl5xx.c:694:2: note: Returning from 'read_register_block'
read_register_block(state,
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:702:2: note: Taking false branch
dev_dbg(state->i2cdev, "freq=%u delsys=%u srate=%u\n",
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/media/dvb-frontends/mxl5xx.c:706:15: note: Assigned value is garbage or undefined
p->frequency = freq;
^ ~~~~
>> drivers/media/dvb-frontends/mxl5xx.c:862:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *) w_buf_ptr, 0, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:862:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *) w_buf_ptr, 0, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:863:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *) w_buf_ptr, (void *) data_ptr, orig_size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:863:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *) w_buf_ptr, (void *) data_ptr, orig_size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:1041:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_DEV_CFG_SKU_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:1041:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_DEV_CFG_SKU_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:1356:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_TUNER_ACTIVATE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:1356:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_TUNER_ACTIVATE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/hwmon/lm75.h:30:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
return (u16)((ntemp / 500) << 7);
^
drivers/hwmon/nct6775.c:2494:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/hwmon/nct6775.c:2494:2: note: Taking false branch
if (err < 0)
^
drivers/hwmon/nct6775.c:2498:26: note: Calling 'LM75_TEMP_TO_REG'
data->temp[index][nr] = LM75_TEMP_TO_REG(val);
^~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm75.h:27:14: note: Assuming '__UNIQUE_ID___x174' is <= '__UNIQUE_ID___y175'
int ntemp = clamp_val(temp, LM75_TEMP_MIN, LM75_TEMP_MAX);
^
include/linux/minmax.h:137:32: note: expanded from macro 'clamp_val'
#define clamp_val(val, lo, hi) clamp_t(typeof(val), val, lo, hi)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:124:48: note: expanded from macro 'clamp_t'
#define clamp_t(type, val, lo, hi) min_t(type, max_t(type, val, lo), hi)
~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^
note: (skipping 3 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/minmax.h:104:48: note: expanded from macro 'min_t'
#define min_t(type, x, y) __careful_cmp((type)(x), (type)(y), <)
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/hwmon/lm75.h:27:14: note: '?' condition is false
int ntemp = clamp_val(temp, LM75_TEMP_MIN, LM75_TEMP_MAX);
^
include/linux/minmax.h:137:32: note: expanded from macro 'clamp_val'
#define clamp_val(val, lo, hi) clamp_t(typeof(val), val, lo, hi)
^
include/linux/minmax.h:124:48: note: expanded from macro 'clamp_t'
#define clamp_t(type, val, lo, hi) min_t(type, max_t(type, val, lo), hi)
^
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/hwmon/lm75.h:27:14: note: '__UNIQUE_ID___x176' is < '__UNIQUE_ID___y177'
int ntemp = clamp_val(temp, LM75_TEMP_MIN, LM75_TEMP_MAX);
^
include/linux/minmax.h:137:32: note: expanded from macro 'clamp_val'
#define clamp_val(val, lo, hi) clamp_t(typeof(val), val, lo, hi)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:124:36: note: expanded from macro 'clamp_t'
--
^~~~~~
drivers/md/dm-ima.c:632:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(device_table_data + l, md->ima.inactive_table.device_metadata,
^~~~~~
drivers/md/dm-ima.c:632:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(device_table_data + l, md->ima.inactive_table.device_metadata,
^~~~~~
drivers/md/dm-ima.c:636:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(device_table_data + l, inactive_str, inactive_len);
^~~~~~
drivers/md/dm-ima.c:636:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(device_table_data + l, inactive_str, inactive_len);
^~~~~~
drivers/md/dm-ima.c:639:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(device_table_data + l, md->ima.inactive_table.hash,
^~~~~~
drivers/md/dm-ima.c:639:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(device_table_data + l, md->ima.inactive_table.hash,
^~~~~~
drivers/md/dm-ima.c:644:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(device_table_data + l, ";", 1);
^~~~~~
drivers/md/dm-ima.c:644:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(device_table_data + l, ";", 1);
^~~~~~
drivers/md/dm-ima.c:661:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(device_table_data + l, capacity_str, capacity_len);
^~~~~~
drivers/md/dm-ima.c:661:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(device_table_data + l, capacity_str, capacity_len);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/hwmon/vt1211.c:368:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:368:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:442:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:442:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:518:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:518:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:624:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:624:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", res);
^~~~~~~
drivers/hwmon/vt1211.c:760:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->pwm_ctl[ix] & 7,
^~~~~~~
drivers/hwmon/vt1211.c:760:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->pwm_ctl[ix] & 7,
^~~~~~~
drivers/hwmon/vt1211.c:824:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->pwm_auto_pwm[ix][ap]);
^~~~~~~
drivers/hwmon/vt1211.c:824:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->pwm_auto_pwm[ix][ap]);
^~~~~~~
drivers/hwmon/vt1211.c:861:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->vrm);
^~~~~~~
drivers/hwmon/vt1211.c:861:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->vrm);
^~~~~~~
drivers/hwmon/vt1211.c:888:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/vt1211.c:888:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/vt1211.c:896:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/vt1211.c:896:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/vt1211.c:904:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->alarms);
^~~~~~~
drivers/hwmon/vt1211.c:904:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->alarms);
^~~~~~~
Suppressed 18 warnings (17 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/media/dvb-frontends/nxt200x.c:98:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf2[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/nxt200x.c:98:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf2[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/nxt200x.c:1175:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &nxt200x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/nxt200x.c:1175:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &nxt200x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/or51211.c:515:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &or51211_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/or51211.c:515:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &or51211_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/tda8083.c:431:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &tda8083_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/tda8083.c:431:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &tda8083_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/dib3000mc.c:923:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&st->demod.ops, &dib3000mc_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/dib3000mc.c:923:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&st->demod.ops, &dib3000mc_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/media/dvb-frontends/dibx000_common.c:34:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mst->msg, 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:34:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mst->msg, 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:58:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mst->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:58:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mst->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:304:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mst->msg, 0, sizeof(struct i2c_msg) * (2 + num));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:304:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mst->msg, 0, sizeof(struct i2c_msg) * (2 + num));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:312:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mst->msg[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:312:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mst->msg[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:350:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mst->msg, 0, sizeof(struct i2c_msg) * (2 + num));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:350:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mst->msg, 0, sizeof(struct i2c_msg) * (2 + num));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:358:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mst->msg[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:358:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mst->msg[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:447:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mst->msg, 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dibx000_common.c:447:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mst->msg, 0, sizeof(struct i2c_msg));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (46 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
140 warnings generated.
drivers/hid/hid-picolcd_debugfs.c:124:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(raw_data, 0, sizeof(raw_data));
^~~~~~
drivers/hid/hid-picolcd_debugfs.c:124:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(raw_data, 0, sizeof(raw_data));
^~~~~~
drivers/hid/hid-picolcd_debugfs.c:406:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, BUFF_SZ, "\nout report %d (size %d) = ",
^~~~~~~~
drivers/hid/hid-picolcd_debugfs.c:406:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, BUFF_SZ, "\nout report %d (size %d) = ",
^~~~~~~~
drivers/hid/hid-picolcd_debugfs.c:417:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, BUFF_SZ, "out report %s (%d, size=%d)\n",
^~~~~~~~
drivers/hid/hid-picolcd_debugfs.c:417:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, BUFF_SZ, "out report %s (%d, size=%d)\n",
^~~~~~~~
drivers/hid/hid-picolcd_debugfs.c:420:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, BUFF_SZ, "\tGPO state: 0x%02x\n", raw_data[1]);
^~~~~~~~
drivers/hid/hid-picolcd_debugfs.c:420:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, BUFF_SZ, "\tGPO state: 0x%02x\n", raw_data[1]);
--
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/power/supply/bq2515x_charger.c:1095:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(bq2515x->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
drivers/power/supply/bq2515x_charger.c:1095:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(bq2515x->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/power/supply/bq25980_charger.c:820:27: warning: The right operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
return (old_state.dischg != new_state->dischg ||
^
drivers/power/supply/bq25980_charger.c:837:8: note: Calling 'bq25980_get_state'
ret = bq25980_get_state(bq, &state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/bq25980_charger.c:571:6: note: Assuming 'ret' is not equal to 0
if (ret)
^~~
drivers/power/supply/bq25980_charger.c:571:2: note: Taking true branch
if (ret)
^
drivers/power/supply/bq25980_charger.c:572:3: note: Returning without writing to 'state->dischg'
return ret;
^
drivers/power/supply/bq25980_charger.c:837:8: note: Returning from 'bq25980_get_state'
ret = bq25980_get_state(bq, &state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/bq25980_charger.c:838:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/power/supply/bq25980_charger.c:838:2: note: Taking false branch
if (ret < 0)
^
drivers/power/supply/bq25980_charger.c:841:7: note: Calling 'bq25980_state_changed'
if (!bq25980_state_changed(bq, &state))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/bq25980_charger.c:820:27: note: The right operand of '!=' is a garbage value
return (old_state.dischg != new_state->dischg ||
^ ~~~~~~~~~~~~~~~~~
drivers/power/supply/bq25980_charger.c:1226:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(bq->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
drivers/power/supply/bq25980_charger.c:1226:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(bq->model_name, id->name, I2C_NAME_SIZE);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/firmware/memmap.c:301:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(entry, 0, sizeof(*entry));
^~~~~~
drivers/firmware/memmap.c:301:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(entry, 0, sizeof(*entry));
^~~~~~
drivers/firmware/memmap.c:372:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "0x%llx\n",
^~~~~~~~
drivers/firmware/memmap.c:372:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "0x%llx\n",
^~~~~~~~
drivers/firmware/memmap.c:378:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "0x%llx\n",
^~~~~~~~
drivers/firmware/memmap.c:378:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "0x%llx\n",
^~~~~~~~
drivers/firmware/memmap.c:384:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", entry->type);
^~~~~~~~
drivers/firmware/memmap.c:384:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", entry->type);
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/or51132.c:566:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &or51132_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/or51132.c:566:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &or51132_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
>> drivers/media/dvb-frontends/bcm3510.c:88:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&b[1],buf,len);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:88:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&b[1],buf,len);
^~~~~~
>> drivers/media/dvb-frontends/bcm3510.c:112:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf,0,len);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:112:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf,0,len);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:222:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ob[2],obuf,olen);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:222:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ob[2],obuf,olen);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:239:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ibuf,&ib[2],ilen);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:239:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ibuf,&ib[2],ilen);
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:366:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c,0,sizeof(struct bcm3510_hab_cmd_tune));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:366:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c,0,sizeof(struct bcm3510_hab_cmd_tune));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:503:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd,0,sizeof(cmd));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:503:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd,0,sizeof(cmd));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:575:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&st->status1,0,sizeof(st->status1));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:575:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&st->status1,0,sizeof(st->status1));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:576:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&st->status2,0,sizeof(st->status2));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:576:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&st->status2,0,sizeof(st->status2));
^~~~~~
drivers/media/dvb-frontends/bcm3510.c:666:2: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
deb_info("Version information: 0x%02x 0x%02x 0x%02x 0x%02x\n",
^
drivers/media/dvb-frontends/bcm3510.c:76:27: note: expanded from macro 'deb_info'
#define deb_info(args...) dprintk(0x01,args)
^
drivers/media/dvb-frontends/bcm3510.c:70:48: note: expanded from macro 'dprintk'
#define dprintk(level,x...) if (level & debug) printk(x)
^
include/linux/printk.h:446:44: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
drivers/media/dvb-frontends/bcm3510.c:766:2: note: Taking false branch
if ((ret = bcm3510_readB(st,0xca,&j)) < 0)
^
drivers/media/dvb-frontends/bcm3510.c:769:2: note: Assuming the condition is false
deb_info("JDEC: %02x\n",j.raw);
^
drivers/media/dvb-frontends/bcm3510.c:76:35: note: expanded from macro 'deb_info'
#define deb_info(args...) dprintk(0x01,args)
~~~~~~~~^~~~~~~~~~
drivers/media/dvb-frontends/bcm3510.c:70:33: note: expanded from macro 'dprintk'
#define dprintk(level,x...) if (level & debug) printk(x)
^~~~~~~~~~~~~
drivers/media/dvb-frontends/bcm3510.c:769:2: note: Taking false branch
deb_info("JDEC: %02x\n",j.raw);
^
drivers/media/dvb-frontends/bcm3510.c:76:27: note: expanded from macro 'deb_info'
#define deb_info(args...) dprintk(0x01,args)
^
drivers/media/dvb-frontends/bcm3510.c:70:29: note: expanded from macro 'dprintk'
#define dprintk(level,x...) if (level & debug) printk(x)
^
drivers/media/dvb-frontends/bcm3510.c:771:2: note: Control jumps to 'case 4:' @line 777
switch (j.JDEC_ca.JDEC) {
^
drivers/media/dvb-frontends/bcm3510.c:778:4: note: Taking false branch
deb_info("firmware is loaded\n");
^
drivers/media/dvb-frontends/bcm3510.c:76:27: note: expanded from macro 'deb_info'
#define deb_info(args...) dprintk(0x01,args)
^
drivers/media/dvb-frontends/bcm3510.c:70:29: note: expanded from macro 'dprintk'
#define dprintk(level,x...) if (level & debug) printk(x)
^
drivers/media/dvb-frontends/bcm3510.c:779:4: note: Calling 'bcm3510_check_firmware_version'
bcm3510_check_firmware_version(st);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/bcm3510.c:664:2: note: Calling 'bcm3510_do_hab_cmd'
bcm3510_do_hab_cmd(st,CMD_GET_VERSION_INFO,MSGID_GET_VERSION_INFO,NULL,0,(u8*)&ver,sizeof(ver));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/bcm3510.c:210:2: note: Taking false branch
if (ilen + 2 > sizeof(ib)) {
^
drivers/media/dvb-frontends/bcm3510.c:215:2: note: Taking false branch
if (olen + 2 > sizeof(ob)) {
^
drivers/media/dvb-frontends/bcm3510.c:224:2: note: Assuming the condition is false
deb_hab("hab snd: ");
--
32 warnings generated.
drivers/hid/hid-kye.c:684:6: warning: Access to field 'maxfield' results in a dereference of an undefined pointer value (loaded from variable 'report') [clang-analyzer-core.NullDereference]
if (report->maxfield < 1 || report->field[0]->report_count < 7) {
^
drivers/hid/hid-kye.c:708:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/hid/hid-kye.c:708:2: note: Taking false branch
if (ret) {
^
drivers/hid/hid-kye.c:714:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/hid/hid-kye.c:714:2: note: Taking false branch
if (ret) {
^
drivers/hid/hid-kye.c:719:2: note: Control jumps to 'case 20501:' @line 725
switch (id->product) {
^
drivers/hid/hid-kye.c:726:9: note: Calling 'kye_tablet_enable'
ret = kye_tablet_enable(hdev);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-kye.c:669:2: note: 'report' declared without an initial value
struct hid_report *report;
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-kye.c:673:2: note: Loop condition is false. Execution continues on line 679
list_for_each(head, list) {
^
include/linux/list.h:580:2: note: expanded from macro 'list_for_each'
for (pos = (head)->next; !list_is_head(pos, (head)); pos = pos->next)
^
drivers/hid/hid-kye.c:679:6: note: Assuming 'head' is not equal to 'list'
if (head == list) {
^~~~~~~~~~~~
drivers/hid/hid-kye.c:679:2: note: Taking false branch
if (head == list) {
^
drivers/hid/hid-kye.c:684:6: note: Access to field 'maxfield' results in a dereference of an undefined pointer value (loaded from variable 'report')
if (report->maxfield < 1 || report->field[0]->report_count < 7) {
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/hid/hid-magicmouse.c:858:3: warning: Value stored to 'report' is never read [clang-analyzer-deadcode.DeadStores]
report = hid_register_report(hdev, HID_INPUT_REPORT,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-magicmouse.c:858:3: note: Value stored to 'report' is never read
report = hid_register_report(hdev, HID_INPUT_REPORT,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/mtd/ubi/cdev.c:754:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(re->new_name, name, name_len);
^~~~~~
drivers/mtd/ubi/cdev.c:754:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(re->new_name, name, name_len);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/mtd/ubi/eba.c:624:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xFF, len);
^~~~~~
drivers/mtd/ubi/eba.c:624:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xFF, len);
^~~~~~
drivers/mtd/ubi/eba.c:837:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ubi->peb_buf + offset, 0xFF, len);
^~~~~~
drivers/mtd/ubi/eba.c:837:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ubi->peb_buf + offset, 0xFF, len);
^~~~~~
drivers/mtd/ubi/eba.c:848:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ubi->peb_buf + offset, buf, len);
^~~~~~
drivers/mtd/ubi/eba.c:848:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ubi->peb_buf + offset, buf, len);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/tua6100.c:185:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &tua6100_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
drivers/media/dvb-frontends/tua6100.c:185:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &tua6100_tuner_ops, sizeof(struct dvb_tuner_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/s5h1409.c:965:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s5h1409_ops,
^~~~~~
drivers/media/dvb-frontends/s5h1409.c:965:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s5h1409_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/cx24113.c:583:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->ops.tuner_ops, &cx24113_tuner_ops,
^~~~~~
drivers/media/dvb-frontends/cx24113.c:583:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->ops.tuner_ops, &cx24113_tuner_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/hwmon/w83l785ts.c:117:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
drivers/hwmon/w83l785ts.c:117:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[attr->index]));
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/hwmon/w83l786ng.c:232:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:232:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:233:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in_min)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:233:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in_min)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:234:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_in_reg(in_max)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:234:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_in_reg(in_max)
^
drivers/hwmon/w83l786ng.c:229:9: note: expanded from macro 'show_in_reg'
return sprintf(buf, "%d\n", IN_FROM_REG(data->reg[nr])); \
^~~~~~~
drivers/hwmon/w83l786ng.c:287:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_fan_reg(fan);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:287:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_fan_reg(fan);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:288:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_fan_reg(fan_min);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:288:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
show_fan_reg(fan_min);
^
drivers/hwmon/w83l786ng.c:283:9: note: expanded from macro 'show_fan_reg'
return sprintf(buf, "%d\n", \
^~~~~~~
drivers/hwmon/w83l786ng.c:319:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", DIV_FROM_REG(data->fan_div[nr]));
^~~~~~~
drivers/hwmon/w83l786ng.c:319:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", DIV_FROM_REG(data->fan_div[nr]));
^~~~~~~
drivers/hwmon/w83l786ng.c:413:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr][index]));
^~~~~~~
drivers/hwmon/w83l786ng.c:413:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr][index]));
^~~~~~~
drivers/hwmon/w83l786ng.c:470:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
show_pwm_reg(pwm_mode)
--
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1010:1: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
DECLARE_EVT(soft_threshold_reached, SOFT_THRESHOLD_REACHED_REPORTED)
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1011:1: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DECLARE_EVT(mode_parameter_change_reported, MODE_PARAMETER_CHANGE_REPORTED)
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1011:1: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
DECLARE_EVT(mode_parameter_change_reported, MODE_PARAMETER_CHANGE_REPORTED)
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1012:1: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DECLARE_EVT(lun_change_reported, LUN_CHANGE_REPORTED)
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1012:1: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
DECLARE_EVT(lun_change_reported, LUN_CHANGE_REPORTED)
^
drivers/scsi/scsi_sysfs.c:1001:2: note: expanded from macro 'DECLARE_EVT'
DECLARE_EVT_SHOW(name, Cap_name) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/scsi_sysfs.c:981:9: note: expanded from macro 'DECLARE_EVT_SHOW'
return snprintf(buf, 20, "%d\n", val); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1038:1: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdev_show_function(queue_depth, "%d\n");
^
drivers/scsi/scsi_sysfs.c:596:9: note: expanded from macro 'sdev_show_function'
return snprintf (buf, 20, format_string, sdev->field); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1038:1: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
sdev_show_function(queue_depth, "%d\n");
^
drivers/scsi/scsi_sysfs.c:596:9: note: expanded from macro 'sdev_show_function'
return snprintf (buf, 20, format_string, sdev->field); \
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1193:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, 20, "%u\n",
^~~~~~~~
drivers/scsi/scsi_sysfs.c:1193:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, 20, "%u\n",
^~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
>> drivers/media/dvb-frontends/dib7000p.c:112:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:112:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->msg, 0, 2 * sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:144:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&state->msg[0], 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:144:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&state->msg[0], 0, sizeof(struct i2c_msg));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c->strength, 0, sizeof(c->strength));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c->strength, 0, sizeof(c->strength));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1671:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c->cnr, 0, sizeof(c->cnr));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1671:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c->cnr, 0, sizeof(c->cnr));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1672:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c->post_bit_error, 0, sizeof(c->post_bit_error));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1672:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c->post_bit_error, 0, sizeof(c->post_bit_error));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1673:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c->post_bit_count, 0, sizeof(c->post_bit_count));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1673:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c->post_bit_count, 0, sizeof(c->post_bit_count));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1674:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&c->block_error, 0, sizeof(c->block_error));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:1674:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&c->block_error, 0, sizeof(c->block_error));
^~~~~~
>> drivers/media/dvb-frontends/dib7000p.c:2745:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&st->cfg, cfg, sizeof(struct dib7000p_config));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:2745:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&st->cfg, cfg, sizeof(struct dib7000p_config));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:2759:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&st->demod.ops, &dib7000p_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/dib7000p.c:2759:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&st->demod.ops, &dib7000p_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/rpmsg/virtio_rpmsg_bus.c:332:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(nsm.name, rpdev->id.name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:332:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(nsm.name, rpdev->id.name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:356:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(nsm.name, rpdev->id.name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:356:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(nsm.name, rpdev->id.name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:427:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(rpdev->id.name, chinfo->name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:427:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(rpdev->id.name, chinfo->name, RPMSG_NAME_SIZE);
^~~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:618:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->data, data, len);
^~~~~~
drivers/rpmsg/virtio_rpmsg_bus.c:618:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->data, data, len);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
drivers/nvme/target/loop.c:179:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iod->cmd, 0, sizeof(iod->cmd));
^~~~~~
drivers/nvme/target/loop.c:179:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iod->cmd, 0, sizeof(iod->cmd));
^~~~~~
drivers/nvme/target/loop.c:353:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctrl->admin_tag_set, 0, sizeof(ctrl->admin_tag_set));
^~~~~~
drivers/nvme/target/loop.c:353:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctrl->admin_tag_set, 0, sizeof(ctrl->admin_tag_set));
^~~~~~
drivers/nvme/target/loop.c:529:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctrl->tag_set, 0, sizeof(ctrl->tag_set));
^~~~~~
drivers/nvme/target/loop.c:529:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctrl->tag_set, 0, sizeof(ctrl->tag_set));
^~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
drivers/nvme/target/fc.c:522:12: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
dev_info(tgtport->dev,
^
include/linux/dev_printk.h:150:46: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^~~
include/linux/dev_printk.h:110:11: note: expanded from macro 'dev_printk_index_wrap'
_p_func(dev, fmt, ##__VA_ARGS__); \
^~~
drivers/nvme/target/fc.c:491:6: note: Assuming field 'ls_req' is non-null
if (!tgtport->ops->ls_req || !assoc->hostport ||
^~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/fc.c:491:6: note: Left side of '||' is false
drivers/nvme/target/fc.c:491:31: note: Assuming field 'hostport' is non-null
if (!tgtport->ops->ls_req || !assoc->hostport ||
^~~~~~~~~~~~~~~~
drivers/nvme/target/fc.c:491:6: note: Left side of '||' is false
if (!tgtport->ops->ls_req || !assoc->hostport ||
^
drivers/nvme/target/fc.c:492:6: note: Assuming field 'invalid' is 0
assoc->hostport->invalid)
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/fc.c:491:2: note: Taking false branch
if (!tgtport->ops->ls_req || !assoc->hostport ||
^
drivers/nvme/target/fc.c:498:6: note: Assuming 'lsop' is non-null
if (!lsop) {
^~~~~
drivers/nvme/target/fc.c:498:2: note: Taking false branch
if (!lsop) {
^
drivers/nvme/target/fc.c:508:6: note: Assuming field 'lsrqst_priv_sz' is 0
if (tgtport->ops->lsrqst_priv_sz)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/nvme/target/fc.c:508:2: note: Taking false branch
--
drivers/extcon/extcon-fsa9480.c:288:2: note: Taking false branch
if (ret) {
^
drivers/extcon/extcon-fsa9480.c:294:2: note: Taking false branch
if (IS_ERR(info->regmap)) {
^
drivers/extcon/extcon-fsa9480.c:316:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/extcon/extcon-fsa9480.c:316:2: note: Taking false branch
if (ret) {
^
drivers/extcon/extcon-fsa9480.c:322:2: note: Calling 'fsa9480_detect_dev'
fsa9480_detect_dev(info);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:6: note: Assuming 'val1' is >= 0
if (val1 < 0 || val2 < 0) {
^~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:6: note: Left side of '||' is false
drivers/extcon/extcon-fsa9480.c:227:18: note: Assuming 'val2' is >= 0
if (val1 < 0 || val2 < 0) {
^~~~~~~~
drivers/extcon/extcon-fsa9480.c:227:2: note: Taking false branch
if (val1 < 0 || val2 < 0) {
^
drivers/extcon/extcon-fsa9480.c:233:2: note: Loop condition is false. Exiting loop
dev_info(usbsw->dev, "dev1: 0x%x, dev2: 0x%x\n", val1, val2);
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/extcon/extcon-fsa9480.c:236:2: note: Calling 'fsa9480_handle_change'
fsa9480_handle_change(usbsw, usbsw->cable & ~val, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/extcon/extcon-fsa9480.c:205:2: note: Loop condition is true. Entering loop body
while (mask) {
^
drivers/extcon/extcon-fsa9480.c:206:3: note: 'dev' initialized to 31
int dev = fls64(mask) - 1;
^~~~~~~
drivers/extcon/extcon-fsa9480.c:207:3: note: Assigned value is garbage or undefined
u64 cables = cable_types[dev];
^ ~~~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/iio/light/tsl2583.c:146:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chip->als_settings.als_device_lux, tsl2583_default_lux,
^~~~~~
drivers/iio/light/tsl2583.c:146:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chip->als_settings.als_device_lux, tsl2583_default_lux,
^~~~~~
drivers/iio/light/tsl2583.c:478:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d\n", chip->als_settings.als_cal_target);
^~~~~~~
drivers/iio/light/tsl2583.c:478:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%d\n", chip->als_settings.als_cal_target);
^~~~~~~
drivers/iio/light/tsl2583.c:536:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
offset += sprintf(buf + offset, "%u,%u,%u,",
^~~~~~~
drivers/iio/light/tsl2583.c:536:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
offset += sprintf(buf + offset, "%u,%u,%u,",
^~~~~~~
drivers/iio/light/tsl2583.c:550:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
offset += sprintf(buf + offset, "\n");
^~~~~~~
drivers/iio/light/tsl2583.c:550:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
offset += sprintf(buf + offset, "\n");
^~~~~~~
drivers/iio/light/tsl2583.c:589:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chip->als_settings.als_device_lux, &value[1],
^~~~~~
drivers/iio/light/tsl2583.c:589:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chip->als_settings.als_device_lux, &value[1],
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/media/dvb-frontends/s5h1411.c:880:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s5h1411_ops,
^~~~~~
drivers/media/dvb-frontends/s5h1411.c:880:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s5h1411_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/iio/pressure/dlhl60d.c:45:8: warning: Excessive padding in 'struct dlh_state' (52 padding bytes, where 20 is optimal).
Optimal fields order:
rx_buf,
use_interrupt,
client,
info,
completion,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct dlh_state {
~~~~~~~^~~~~~~~~~~
drivers/iio/pressure/dlhl60d.c:45:8: note: Excessive padding in 'struct dlh_state' (52 padding bytes, where 20 is optimal). Optimal fields order: rx_buf, use_interrupt, client, info, completion, consider reordering the fields or adding explicit padding members
struct dlh_state {
~~~~~~~^~~~~~~~~~~
drivers/iio/pressure/dlhl60d.c:262:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp_buf + i,
^~~~~~
drivers/iio/pressure/dlhl60d.c:262:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp_buf + i,
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/iio/pressure/icp10100.c:264:15: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
*pressure = (be16_to_cpu(measures[0]) << 8) |
^
include/linux/byteorder/generic.h:97:21: note: expanded from macro 'be16_to_cpu'
#define be16_to_cpu __be16_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:43:26: note: expanded from macro '__be16_to_cpu'
#define __be16_to_cpu(x) __swab16((__force __u16)(__be16)(x))
^
include/uapi/linux/swab.h:102:28: note: expanded from macro '__swab16'
#define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
^
drivers/iio/pressure/icp10100.c:383:2: note: Control jumps to 'case IIO_CHAN_INFO_PROCESSED:' @line 385
switch (mask) {
^
drivers/iio/pressure/icp10100.c:386:10: note: Calling 'icp10100_read_raw_measures'
return icp10100_read_raw_measures(indio_dev, chan, val, val2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:347:6: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/iio/pressure/icp10100.c:347:2: note: Taking false branch
if (ret)
^
drivers/iio/pressure/icp10100.c:350:8: note: Calling 'icp10100_get_measures'
ret = icp10100_get_measures(st, &raw_pressure, &raw_temp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:254:6: note: 'ret' is >= 0
if (ret < 0)
^~~
drivers/iio/pressure/icp10100.c:254:2: note: Taking false branch
if (ret < 0)
^
drivers/iio/pressure/icp10100.c:259:8: note: Calling 'icp10100_send_cmd'
ret = icp10100_send_cmd(st, cmd, measures, sizeof(measures));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:145:6: note: Assuming the condition is false
if (size > sizeof(data))
^~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:145:2: note: Taking false branch
if (size > sizeof(data))
^
drivers/iio/pressure/icp10100.c:148:6: note: Assuming field 'response_word_nb' is <= 0
if (cmd->response_word_nb > 0 &&
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:148:32: note: Left side of '&&' is false
if (cmd->response_word_nb > 0 &&
^
drivers/iio/pressure/icp10100.c:152:2: note: Taking false branch
dev_dbg(&st->client->dev, "sending cmd %#x\n", be16_to_cpu(cmd->cmd));
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/iio/pressure/icp10100.c:154:11: note: Field 'response_word_nb' is <= 0
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^
drivers/iio/pressure/icp10100.c:154:32: note: Left side of '&&' is false
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^
drivers/iio/pressure/icp10100.c:162:9: note: Calling 'icp10100_i2c_xfer'
ret = icp10100_i2c_xfer(st->client->adapter, &msgs[0], 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:111:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/iio/pressure/icp10100.c:111:2: note: Taking false branch
--
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/iio/pressure/icp10100.c:154:11: note: Field 'response_word_nb' is > 0
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^
drivers/iio/pressure/icp10100.c:154:6: note: Left side of '&&' is true
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^
drivers/iio/pressure/icp10100.c:154:35: note: Assuming field 'wait_us' is equal to 0
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:154:2: note: Taking true branch
if (cmd->response_word_nb > 0 && cmd->wait_us == 0) {
^
drivers/iio/pressure/icp10100.c:156:9: note: Calling 'icp10100_i2c_xfer'
ret = icp10100_i2c_xfer(st->client->adapter, msgs,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:111:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/iio/pressure/icp10100.c:111:2: note: Taking false branch
if (ret < 0)
^
drivers/iio/pressure/icp10100.c:114:6: note: Assuming 'ret' is equal to 'num'
if (ret != num)
^~~~~~~~~~
drivers/iio/pressure/icp10100.c:114:2: note: Taking false branch
if (ret != num)
^
drivers/iio/pressure/icp10100.c:117:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
drivers/iio/pressure/icp10100.c:156:9: note: Returning from 'icp10100_i2c_xfer'
ret = icp10100_i2c_xfer(st->client->adapter, msgs,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:158:7: note: 'ret' is 0
if (ret)
^~~
drivers/iio/pressure/icp10100.c:158:3: note: Taking false branch
if (ret)
^
drivers/iio/pressure/icp10100.c:178:14: note: Assuming 'i' is < field 'response_word_nb'
for (i = 0; i < cmd->response_word_nb; ++i) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:178:2: note: Loop condition is true. Entering loop body
for (i = 0; i < cmd->response_word_nb; ++i) {
^
drivers/iio/pressure/icp10100.c:182:7: note: Assuming the condition is false
if (crc != ptr[ICP10100_CRC8_WORD_LENGTH]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:182:3: note: Taking false branch
if (crc != ptr[ICP10100_CRC8_WORD_LENGTH]) {
^
drivers/iio/pressure/icp10100.c:178:14: note: Assuming 'i' is < field 'response_word_nb'
for (i = 0; i < cmd->response_word_nb; ++i) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:178:2: note: Loop condition is true. Entering loop body
for (i = 0; i < cmd->response_word_nb; ++i) {
^
drivers/iio/pressure/icp10100.c:182:7: note: Assuming the condition is false
if (crc != ptr[ICP10100_CRC8_WORD_LENGTH]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:182:3: note: Taking false branch
if (crc != ptr[ICP10100_CRC8_WORD_LENGTH]) {
^
drivers/iio/pressure/icp10100.c:178:14: note: Assuming 'i' is >= field 'response_word_nb'
for (i = 0; i < cmd->response_word_nb; ++i) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:178:2: note: Loop condition is false. Execution continues on line 191
for (i = 0; i < cmd->response_word_nb; ++i) {
^
drivers/iio/pressure/icp10100.c:191:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
drivers/iio/pressure/icp10100.c:259:8: note: Returning from 'icp10100_send_cmd'
ret = icp10100_send_cmd(st, cmd, measures, sizeof(measures));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/pressure/icp10100.c:261:6: note: 'ret' is 0
if (ret)
^~~
drivers/iio/pressure/icp10100.c:261:2: note: Taking false branch
if (ret)
^
drivers/iio/pressure/icp10100.c:266:17: note: 1st function call argument is an uninitialized value
*temperature = be16_to_cpu(measures[2]);
^
include/linux/byteorder/generic.h:97:21: note: expanded from macro 'be16_to_cpu'
#define be16_to_cpu __be16_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:43:26: note: expanded from macro '__be16_to_cpu'
#define __be16_to_cpu(x) __swab16((__force __u16)(__be16)(x))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/uapi/linux/swab.h:102:28: note: expanded from macro '__swab16'
#define __swab16(x) (__u16)__builtin_bswap16((__u16)(x))
^ ~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/media/radio/si470x/radio-si470x-i2c.c:306:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&radio->buffer[radio->wr_index], &tmpbuf, 3);
^~~~~~
drivers/media/radio/si470x/radio-si470x-i2c.c:306:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&radio->buffer[radio->wr_index], &tmpbuf, 3);
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/media/radio/radio-wl1273.c:194:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&radio->buffer[radio->wr_index], &rds, RDS_BLOCK_SIZE);
^~~~~~
drivers/media/radio/radio-wl1273.c:194:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&radio->buffer[radio->wr_index], &rds, RDS_BLOCK_SIZE);
^~~~~~
drivers/media/radio/radio-wl1273.c:1292:24: warning: Value stored to 'radio' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1292:24: note: Value stored to 'radio' during its initialization is never read
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1304:24: warning: Value stored to 'radio' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1304:24: note: Value stored to 'radio' during its initialization is never read
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1467:24: warning: Value stored to 'radio' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1467:24: note: Value stored to 'radio' during its initialization is never read
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1483:24: warning: Value stored to 'radio' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1483:24: note: Value stored to 'radio' during its initialization is never read
struct wl1273_device *radio = video_get_drvdata(video_devdata(file));
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1739:3: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = wl1273_fm_set_rds(radio, WL1273_RDS_ON);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1739:3: note: Value stored to 'r' is never read
r = wl1273_fm_set_rds(radio, WL1273_RDS_ON);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1741:3: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = wl1273_fm_set_rds(radio, WL1273_RDS_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/radio/radio-wl1273.c:1741:3: note: Value stored to 'r' is never read
r = wl1273_fm_set_rds(radio, WL1273_RDS_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/firmware/google/coreboot_table.c:104:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&device->entry, ptr_entry, entry->size);
^~~~~~
drivers/firmware/google/coreboot_table.c:104:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&device->entry, ptr_entry, entry->size);
^~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/firmware/google/framebuffer-coreboot.c:54:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&res, 0, sizeof(res));
^~~~~~
drivers/firmware/google/framebuffer-coreboot.c:54:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&res, 0, sizeof(res));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
drivers/most/configfs.c:162:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->direction);
^~~~~~~~
drivers/most/configfs.c:162:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->direction);
^~~~~~~~
drivers/most/configfs.c:173:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(mdev_link->direction, page);
^~~~~~
drivers/most/configfs.c:173:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mdev_link->direction, page);
^~~~~~
drivers/most/configfs.c:180:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->datatype);
^~~~~~~~
drivers/most/configfs.c:180:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->datatype);
^~~~~~~~
drivers/most/configfs.c:192:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(mdev_link->datatype, page);
^~~~~~
drivers/most/configfs.c:192:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mdev_link->datatype, page);
^~~~~~
drivers/most/configfs.c:199:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->device);
^~~~~~~~
drivers/most/configfs.c:199:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%s\n", to_mdev_link(item)->device);
--
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0, which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/media/dvb-frontends/s5h1420.c:186:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
((cmd->msg_len-1) << 4) | 0x08);
~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Assuming 'debug' is 0
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:61:6: note: expanded from macro 'dprintk'
if (debug) \
^~~~~
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Taking false branch
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:61:2: note: expanded from macro 'dprintk'
if (debug) \
^
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Loop condition is false. Exiting loop
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:60:23: note: expanded from macro 'dprintk'
#define dprintk(x...) do { \
^
drivers/media/dvb-frontends/s5h1420.c:171:6: note: Assuming the condition is false
if (cmd->msg_len > sizeof(cmd->msg))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/s5h1420.c:171:2: note: Taking false branch
if (cmd->msg_len > sizeof(cmd->msg))
^
drivers/media/dvb-frontends/s5h1420.c:180:11: note: Assuming 'i' is >= field 'msg_len'
for(i=0; i< cmd->msg_len; i++) {
^~~~~~~~~~~~~~~
drivers/media/dvb-frontends/s5h1420.c:180:2: note: Loop condition is false. Execution continues on line 185
for(i=0; i< cmd->msg_len; i++) {
^
drivers/media/dvb-frontends/s5h1420.c:186:29: note: The result of the left shift is undefined because the left operand is negative
((cmd->msg_len-1) << 4) | 0x08);
~~~~~~~~~~~~~~~~ ^
>> drivers/media/dvb-frontends/s5h1420.c:846:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(m, 0, sizeof(struct i2c_msg) * (1 + num));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:846:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(m, 0, sizeof(struct i2c_msg) * (1 + num));
^~~~~~
>> drivers/media/dvb-frontends/s5h1420.c:852:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&m[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:852:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&m[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:895:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->shadow, 0xff, sizeof(state->shadow));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:895:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->shadow, 0xff, sizeof(state->shadow));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s5h1420_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s5h1420_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
drivers/mux/mmio.c:93:15: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
field.msb = fls(mask) - 1;
^ ~~~~
drivers/mux/mmio.c:47:6: note: Assuming the condition is true
if (of_device_is_compatible(np, "mmio-mux"))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mux/mmio.c:47:2: note: Taking true branch
if (of_device_is_compatible(np, "mmio-mux"))
^
drivers/mux/mmio.c:51:6: note: Calling 'IS_ERR'
if (IS_ERR(regmap)) {
^~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mux/mmio.c:51:6: note: Returning from 'IS_ERR'
if (IS_ERR(regmap)) {
^~~~~~~~~~~~~~
drivers/mux/mmio.c:51:2: note: Taking false branch
if (IS_ERR(regmap)) {
^
drivers/mux/mmio.c:58:6: note: Assuming 'ret' is not equal to 0
if (ret == 0 || ret % 2)
^~~~~~~~
drivers/mux/mmio.c:58:6: note: Left side of '||' is false
drivers/mux/mmio.c:58:18: note: Assuming the condition is false
if (ret == 0 || ret % 2)
^~~~~~~
drivers/mux/mmio.c:58:2: note: Taking false branch
if (ret == 0 || ret % 2)
^
drivers/mux/mmio.c:60:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/mux/mmio.c:60:2: note: Taking false branch
if (ret < 0) {
^
drivers/mux/mmio.c:69:6: note: Calling 'IS_ERR'
if (IS_ERR(mux_chip))
^~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mux/mmio.c:69:6: note: Returning from 'IS_ERR'
if (IS_ERR(mux_chip))
^~~~~~~~~~~~~~~~
drivers/mux/mmio.c:69:2: note: Taking false branch
if (IS_ERR(mux_chip))
^
drivers/mux/mmio.c:74:14: note: Assuming 'i' is < 'num_fields'
for (i = 0; i < num_fields; i++) {
^~~~~~~~~~~~~~
drivers/mux/mmio.c:74:2: note: Loop condition is true. Entering loop body
for (i = 0; i < num_fields; i++) {
^
drivers/mux/mmio.c:78:12: note: 'mask' declared without an initial value
--
memcpy(&chip->settings, chip->pdata->platform_default_settings,
^~~~~~
drivers/iio/light/tsl2772.c:630:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chip->settings, chip->pdata->platform_default_settings,
^~~~~~
drivers/iio/light/tsl2772.c:633:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&chip->settings, &tsl2772_default_settings,
^~~~~~
drivers/iio/light/tsl2772.c:633:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chip->settings, &tsl2772_default_settings,
^~~~~~
drivers/iio/light/tsl2772.c:638:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chip->tsl2772_device_lux,
^~~~~~
drivers/iio/light/tsl2772.c:638:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chip->tsl2772_device_lux,
^~~~~~
drivers/iio/light/tsl2772.c:642:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chip->tsl2772_device_lux,
^~~~~~
drivers/iio/light/tsl2772.c:642:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chip->tsl2772_device_lux,
^~~~~~
drivers/iio/light/tsl2772.c:896:40: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
chip->settings.prox_thres_high = (max << 1) - mean;
^
drivers/iio/light/tsl2772.c:1057:6: note: Assuming the condition is false
if (kstrtobool(buf, &value) || !value)
^~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:1057:6: note: Left side of '||' is false
drivers/iio/light/tsl2772.c:1057:33: note: Assuming 'value' is true
if (kstrtobool(buf, &value) || !value)
^~~~~~
drivers/iio/light/tsl2772.c:1057:2: note: Taking false branch
if (kstrtobool(buf, &value) || !value)
^
drivers/iio/light/tsl2772.c:1060:8: note: Calling 'tsl2772_prox_cal'
ret = tsl2772_prox_cal(indio_dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:875:6: note: Assuming field 'prox_max_samples_cal' is >= 1
if (chip->settings.prox_max_samples_cal < 1 ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:875:6: note: Left side of '||' is false
drivers/iio/light/tsl2772.c:876:6: note: Assuming field 'prox_max_samples_cal' is <= MAX_SAMPLES_CAL
chip->settings.prox_max_samples_cal > MAX_SAMPLES_CAL)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:875:2: note: Taking false branch
if (chip->settings.prox_max_samples_cal < 1 ||
^
drivers/iio/light/tsl2772.c:879:14: note: 'i' is < field 'prox_max_samples_cal'
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^
drivers/iio/light/tsl2772.c:879:2: note: Loop condition is true. Entering loop body
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^
drivers/iio/light/tsl2772.c:882:7: note: 'ret' is >= 0
if (ret < 0)
^~~
drivers/iio/light/tsl2772.c:882:3: note: Taking false branch
if (ret < 0)
^
drivers/iio/light/tsl2772.c:879:14: note: Assuming 'i' is >= field 'prox_max_samples_cal'
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:879:2: note: Loop condition is false. Execution continues on line 888
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^
drivers/iio/light/tsl2772.c:889:2: note: The value -2147483648 is assigned to 'max'
max = INT_MIN;
^~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:890:14: note: Assuming 'i' is >= field 'prox_max_samples_cal'
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/light/tsl2772.c:890:2: note: Loop condition is false. Execution continues on line 894
for (i = 0; i < chip->settings.prox_max_samples_cal; i++) {
^
drivers/iio/light/tsl2772.c:896:40: note: The result of the left shift is undefined because the left operand is negative
chip->settings.prox_thres_high = (max << 1) - mean;
~~~ ^
drivers/iio/light/tsl2772.c:1039:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(chip->tsl2772_device_lux, 0, sizeof(chip->tsl2772_device_lux));
^~~~~~
drivers/iio/light/tsl2772.c:1039:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(chip->tsl2772_device_lux, 0, sizeof(chip->tsl2772_device_lux));
^~~~~~
drivers/iio/light/tsl2772.c:1040:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(chip->tsl2772_device_lux, &value[1], (value[0] * 4));
^~~~~~
drivers/iio/light/tsl2772.c:1040:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(chip->tsl2772_device_lux, &value[1], (value[0] * 4));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/dvb-frontends/si2165.c:528:34: warning: Value stored to 'c' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/si2165.c:528:34: note: Value stored to 'c' during its initialization is never read
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/media/dvb-frontends/si2165.c:1193:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->fe.ops, &si2165_ops,
^~~~~~
drivers/media/dvb-frontends/si2165.c:1193:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->fe.ops, &si2165_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/dvb-frontends/sp2.c:73:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buffer[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/sp2.c:73:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buffer[1], buf, len);
^~~~~~
drivers/media/dvb-frontends/sp2.c:208:14: warning: Value stored to 's' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct sp2 *s = en50221->data;
^ ~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp2.c:208:14: note: Value stored to 's' during its initialization is never read
struct sp2 *s = en50221->data;
^ ~~~~~~~~~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/media/dvb-frontends/tda10071.c:42:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:42:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:92:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:92:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:137:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:137:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:183:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:183:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
>> drivers/media/dvb-frontends/tda10071.c:227:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cmd.args[7], diseqc_cmd->msg, diseqc_cmd->msg_len);
^~~~~~
drivers/media/dvb-frontends/tda10071.c:227:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cmd.args[7], diseqc_cmd->msg, diseqc_cmd->msg_len);
^~~~~~
drivers/media/dvb-frontends/tda10071.c:243:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:243:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:303:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:303:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:366:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:366:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:550:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:550:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:696:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:696:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:1041:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:1041:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/tda10071.c:1208:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &tda10071_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/tda10071.c:1208:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &tda10071_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/mtd/mtdcore.c:660:3: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = 0;
^ ~
drivers/mtd/mtdcore.c:660:3: note: Value stored to 'error' is never read
error = 0;
^ ~
drivers/mtd/mtdcore.c:751:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mtd->dev, 0, sizeof(mtd->dev));
^~~~~~
drivers/mtd/mtdcore.c:751:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mtd->dev, 0, sizeof(mtd->dev));
^~~~~~
drivers/mtd/mtdcore.c:1026:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&master->reboot_notifier, 0, sizeof(master->reboot_notifier));
^~~~~~
drivers/mtd/mtdcore.c:1026:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&master->reboot_notifier, 0, sizeof(master->reboot_notifier));
^~~~~~
drivers/mtd/mtdcore.c:1648:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oobecc, 0, sizeof(*oobecc));
^~~~~~
drivers/mtd/mtdcore.c:1648:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oobecc, 0, sizeof(*oobecc));
^~~~~~
drivers/mtd/mtdcore.c:1682:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oobfree, 0, sizeof(*oobfree));
^~~~~~
drivers/mtd/mtdcore.c:1682:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oobfree, 0, sizeof(*oobfree));
^~~~~~
drivers/mtd/mtdcore.c:1719:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oobregion, 0, sizeof(*oobregion));
^~~~~~
drivers/mtd/mtdcore.c:1719:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oobregion, 0, sizeof(*oobregion));
^~~~~~
drivers/mtd/mtdcore.c:1796:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, oobbuf + oobregion.offset, cnt);
^~~~~~
drivers/mtd/mtdcore.c:1796:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, oobbuf + oobregion.offset, cnt);
^~~~~~
drivers/mtd/mtdcore.c:1839:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oobbuf + oobregion.offset, buf, cnt);
^~~~~~
drivers/mtd/mtdcore.c:1839:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(oobbuf + oobregion.offset, buf, cnt);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> drivers/media/i2c/mt9t112.c:176:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ret, buf, 2);
^~~~~~
drivers/media/i2c/mt9t112.c:176:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ret, buf, 2);
^~~~~~
drivers/media/i2c/mt9t112.c:191:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 0, &command, 2);
^~~~~~
drivers/media/i2c/mt9t112.c:191:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 0, &command, 2);
^~~~~~
drivers/media/i2c/mt9t112.c:192:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 2, &data, 2);
^~~~~~
drivers/media/i2c/mt9t112.c:192:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 2, &data, 2);
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/i2c/mt9v111.c:492:13: warning: Although the value stored to 'vb' is used in the enclosing expression, the value is never actually read from 'vb' [clang-analyzer-deadcode.DeadStores]
best_fps = vb = hb = 0;
^ ~~~~~~
drivers/media/i2c/mt9v111.c:492:13: note: Although the value stored to 'vb' is used in the enclosing expression, the value is never actually read from 'vb'
best_fps = vb = hb = 0;
^ ~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
drivers/ipack/ipack.c:128:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(&buf[c], "%02x", idev->id[i]);
^~~~~~~
drivers/ipack/ipack.c:128:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(&buf[c], "%02x", idev->id[i]);
^~~~~~~
drivers/ipack/ipack.c:141:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%02x\n", idev->id_vendor);
^~~~~~~
drivers/ipack/ipack.c:141:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%02x\n", idev->id_vendor);
^~~~~~~
drivers/ipack/ipack.c:143:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%06x\n", idev->id_vendor);
^~~~~~~
drivers/ipack/ipack.c:143:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%06x\n", idev->id_vendor);
^~~~~~~
drivers/ipack/ipack.c:155:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%02x\n", idev->id_device);
^~~~~~~
drivers/ipack/ipack.c:155:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%02x\n", idev->id_device);
^~~~~~~
drivers/ipack/ipack.c:157:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%04x\n", idev->id_device);
^~~~~~~
drivers/ipack/ipack.c:157:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%04x\n", idev->id_device);
^~~~~~~
drivers/ipack/ipack.c:168:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "ipac:f%02Xv%08Xd%08X", idev->id_format,
^~~~~~~
drivers/ipack/ipack.c:168:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "ipac:f%02Xv%08Xd%08X", idev->id_format,
^~~~~~~
drivers/ipack/ipack.c:172:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ipack_device_attr(id_format, "0x%hhx\n");
^
drivers/ipack/ipack.c:102:9: note: expanded from macro 'ipack_device_attr'
return sprintf(buf, format_string, idev->field); \
^~~~~~~
drivers/ipack/ipack.c:172:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ipack_device_attr(id_format, "0x%hhx\n");
^
drivers/ipack/ipack.c:102:9: note: expanded from macro 'ipack_device_attr'
return sprintf(buf, format_string, idev->field); \
^~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/media/v4l2-core/v4l2-dev.c:51:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%i\n", vdev->index);
^~~~~~~
drivers/media/v4l2-core/v4l2-dev.c:51:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%i\n", vdev->index);
--
^~~~~~
drivers/hid/hid-steam.c:154:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, buf + 1, min(size, ret - 1));
^~~~~~
drivers/hid/hid-steam.c:176:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 1, cmd, size);
^~~~~~
drivers/hid/hid-steam.c:176:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 1, cmd, size);
^~~~~~
drivers/hid/hid-steam.c:246:15: warning: The left operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (reply[0] != 0xae || reply[1] != 0x15 || reply[2] != 0x01)
^
drivers/hid/hid-steam.c:570:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&steam->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/hid/hid-steam.c:570:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&steam->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/hid/hid-steam.c:574:6: note: Assuming 'connected' is true
if (connected) {
^~~~~~~~~
drivers/hid/hid-steam.c:574:2: note: Taking true branch
if (connected) {
^
drivers/hid/hid-steam.c:575:9: note: Calling 'steam_register'
ret = steam_register(steam);
^~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:510:6: note: Assuming the condition is true
if (!steam->serial_no[0]) {
^~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:510:2: note: Taking true branch
if (!steam->serial_no[0]) {
^
drivers/hid/hid-steam.c:516:7: note: Calling 'steam_get_serial'
if (steam_get_serial(steam) < 0)
^~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:241:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/hid/hid-steam.c:241:2: note: Taking false branch
if (ret < 0)
^
drivers/hid/hid-steam.c:243:8: note: Calling 'steam_recv_report'
ret = steam_recv_report(steam, reply, sizeof(reply));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:137:6: note: Assuming the condition is false
if (hid_report_len(r) < 64)
^~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:137:2: note: Taking false branch
if (hid_report_len(r) < 64)
^
drivers/hid/hid-steam.c:141:6: note: Assuming 'buf' is non-null
if (!buf)
^~~~
drivers/hid/hid-steam.c:141:2: note: Taking false branch
if (!buf)
^
drivers/hid/hid-steam.c:153:6: note: Assuming 'ret' is <= 0
if (ret > 0)
^~~~~~~
drivers/hid/hid-steam.c:153:2: note: Taking false branch
if (ret > 0)
^
drivers/hid/hid-steam.c:156:2: note: Returning without writing to '*data'
return ret;
^
drivers/hid/hid-steam.c:243:8: note: Returning from 'steam_recv_report'
ret = steam_recv_report(steam, reply, sizeof(reply));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-steam.c:244:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/hid/hid-steam.c:244:2: note: Taking false branch
if (ret < 0)
^
drivers/hid/hid-steam.c:246:15: note: The left operand of '!=' is a garbage value
if (reply[0] != 0xae || reply[1] != 0x15 || reply[2] != 0x01)
~~~~~~~~ ^
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/cpuidle/governors/menu.c:551:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, sizeof(struct menu_device));
^~~~~~
drivers/cpuidle/governors/menu.c:551:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, sizeof(struct menu_device));
^~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
>> drivers/cpuidle/dt_idle_states.c:88:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(idle_state->name, state_node->name, CPUIDLE_NAME_LEN - 1);
^~~~~~~
drivers/cpuidle/dt_idle_states.c:88:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(idle_state->name, state_node->name, CPUIDLE_NAME_LEN - 1);
^~~~~~~
drivers/cpuidle/dt_idle_states.c:89:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(idle_state->desc, desc, CPUIDLE_DESC_LEN - 1);
^~~~~~~
drivers/cpuidle/dt_idle_states.c:89:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(idle_state->desc, desc, CPUIDLE_DESC_LEN - 1);
^~~~~~~
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/mmc/core/core.c:550:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/mmc/core/core.c:550:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/mmc/core/core.c:557:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/mmc/core/core.c:557:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/mmc/core/core.c:628:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd->resp, 0, sizeof(cmd->resp));
^~~~~~
drivers/mmc/core/core.c:628:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd->resp, 0, sizeof(cmd->resp));
^~~~~~
drivers/mmc/core/core.c:1638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/core.c:1638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/core.c:1653:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/core.c:1653:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/core.c:1940:19: warning: Value stored to 'host' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct mmc_host *host = card->host;
^~~~ ~~~~~~~~~~
drivers/mmc/core/core.c:1940:19: note: Value stored to 'host' during its initialization is never read
struct mmc_host *host = card->host;
^~~~ ~~~~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/iio/proximity/isl29501.c:295:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", value);
^~~~~~~
drivers/iio/proximity/isl29501.c:295:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", value);
^~~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/iio/proximity/srf08.c:233:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "[0.043 0.043 11.008]\n");
^~~~~~~
drivers/iio/proximity/srf08.c:233:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "[0.043 0.043 11.008]\n");
^~~~~~~
drivers/iio/proximity/srf08.c:245:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%03d\n", data->range_mm / 1000,
^~~~~~~
drivers/iio/proximity/srf08.c:245:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%03d\n", data->range_mm / 1000,
^~~~~~~
drivers/iio/proximity/srf08.c:323:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%d ",
^~~~~~~
drivers/iio/proximity/srf08.c:323:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%d ",
--
drivers/hid/hid-input.c:2016:12: note: Field 'input_configured' is null
if (drv->input_configured &&
^
drivers/hid/hid-input.c:2016:29: note: Left side of '&&' is false
if (drv->input_configured &&
^
drivers/hid/hid-input.c:2020:7: note: Assuming the condition is false
if (!hidinput_has_been_populated(hidinput)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2020:3: note: Taking false branch
if (!hidinput_has_been_populated(hidinput)) {
^
drivers/hid/hid-input.c:2026:7: note: Assuming the condition is true
if (input_register_device(hidinput->input))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2026:3: note: Taking true branch
if (input_register_device(hidinput->input))
^
drivers/hid/hid-input.c:2027:4: note: Control jumps to line 2044
goto out_unwind;
^
drivers/hid/hid-input.c:2044:2: note: Calling 'hidinput_disconnect'
hidinput_disconnect(hid);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-input.c:2056:2: note: Use of memory after it is freed
list_for_each_entry_safe(hidinput, next, &hid->inputs, list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/dvb-frontends/stv090x.c:728:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], data, count);
^~~~~~
drivers/media/dvb-frontends/stv090x.c:728:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], data, count);
^~~~~~
drivers/media/dvb-frontends/stv090x.c:2289:23: warning: The result of the '/' expression is undefined [clang-analyzer-core.UndefinedBinaryOperatorResult]
steps_max = (car_max / inc) + 1; /* min steps = 3 */
^
drivers/media/dvb-frontends/stv090x.c:2405:2: note: Calling 'stv090x_get_loop_params'
stv090x_get_loop_params(state, &inc, &timeout_step, &steps_max);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv090x.c:2251:6: note: Assuming 'car_max' is <= 16384
if (car_max > 0x4000)
^~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv090x.c:2251:2: note: Taking false branch
if (car_max > 0x4000)
^
drivers/media/dvb-frontends/stv090x.c:2260:2: note: Control jumps to 'case STV090x_SEARCH_DVBS2:' at line 2267
switch (state->search_mode) {
^
drivers/media/dvb-frontends/stv090x.c:2270:3: note: Execution continues on line 2278
break;
^
drivers/media/dvb-frontends/stv090x.c:2279:7: note: Assuming 'inc' is <= 'car_max'
if ((inc > car_max) || (inc < 0))
^~~~~~~~~~~~~
drivers/media/dvb-frontends/stv090x.c:2279:6: note: Left side of '||' is false
if ((inc > car_max) || (inc < 0))
^
drivers/media/dvb-frontends/stv090x.c:2279:26: note: Assuming 'inc' is >= 0
if ((inc > car_max) || (inc < 0))
^~~~~~~
drivers/media/dvb-frontends/stv090x.c:2279:2: note: Taking false branch
if ((inc > car_max) || (inc < 0))
^
drivers/media/dvb-frontends/stv090x.c:2283:6: note: Assuming 'srate' is <= 0
if (srate > 0)
^~~~~~~~~
drivers/media/dvb-frontends/stv090x.c:2283:2: note: Taking false branch
if (srate > 0)
^
drivers/media/dvb-frontends/stv090x.c:2286:7: note: 'timeout' is > 100
if ((timeout > 100) || (timeout < 0))
^~~~~~~
drivers/media/dvb-frontends/stv090x.c:2286:22: note: Left side of '||' is true
if ((timeout > 100) || (timeout < 0))
^
drivers/media/dvb-frontends/stv090x.c:2289:23: note: The result of the '/' expression is undefined
steps_max = (car_max / inc) + 1; /* min steps = 3 */
~~~~~~~~^~~~~
drivers/media/dvb-frontends/stv090x.c:2960:2: warning: Value stored to 'reg' is never read [clang-analyzer-deadcode.DeadStores]
reg = STV090x_READ_DEMOD(state, TMGOBS);
^
drivers/media/dvb-frontends/stv090x.c:2960:2: note: Value stored to 'reg' is never read
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
>> drivers/pps/clients/pps-ldisc.c:51:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(info.name, PPS_MAX_NAME_LEN, "%s%d", drv->driver_name, index);
^~~~~~~~
drivers/pps/clients/pps-ldisc.c:51:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(info.name, PPS_MAX_NAME_LEN, "%s%d", drv->driver_name, index);
^~~~~~~~
drivers/pps/clients/pps-ldisc.c:52:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(info.path, PPS_MAX_NAME_LEN, "/dev/%s%d", drv->name, index);
^~~~~~~~
drivers/pps/clients/pps-ldisc.c:52:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(info.path, PPS_MAX_NAME_LEN, "/dev/%s%d", drv->name, index);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/pps/clients/pps_parport.c:152:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pps_client_cb, 0, sizeof(pps_client_cb));
^~~~~~
drivers/pps/clients/pps_parport.c:152:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pps_client_cb, 0, sizeof(pps_client_cb));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/pcm186x.c:268:19: warning: Value stored to 'format' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
snd_pcm_format_t format = params_format(params);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/pcm186x.c:268:19: note: Value stored to 'format' during its initialization is never read
snd_pcm_format_t format = params_format(params);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1807:10: warning: The result of the left shift is undefined due to shifting '3' by '31', which is unrepresentable in the unsigned version of the return type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
data = ST_LSM6DSX_SHIFT_VAL(3, hub_settings->aux_sens.mask);
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx.h:65:49: note: expanded from macro 'ST_LSM6DSX_SHIFT_VAL'
#define ST_LSM6DSX_SHIFT_VAL(val, mask) (((val) << __ffs(mask)) & (mask))
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2207:6: note: Assuming 'hw' is non-null
if (!hw)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2207:2: note: Taking false branch
if (!hw)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2212:2: note: Loop condition is false. Exiting loop
mutex_init(&hw->fifo_lock);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2213:2: note: Loop condition is false. Exiting loop
mutex_init(&hw->conf_lock);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2214:2: note: Loop condition is false. Exiting loop
mutex_init(&hw->page_lock);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2217:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2217:2: note: Taking false branch
if (err)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2221:6: note: 'err' is 0
if (err)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2221:2: note: Taking false branch
if (err)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2225:6: note: Assuming field 'buff' is non-null
if (!hw->buff)
^~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2225:2: note: Taking false branch
if (!hw->buff)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2233:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2233:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2238:3: note: Taking false branch
if (!hw->iio_devs[i])
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2238:3: note: Taking false branch
if (!hw->iio_devs[i])
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is false. Execution continues on line 2242
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2242:8: note: Calling 'st_lsm6dsx_init_device'
err = st_lsm6dsx_init_device(hw);
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1926:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1926:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1933:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1933:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1938:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1938:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1943:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1943:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1947:6: note: Assuming field 'addr' is 0
if (hw->settings->irq_config.lir.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1947:2: note: Taking false branch
if (hw->settings->irq_config.lir.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1966:6: note: Assuming field 'addr' is 0
if (hw->settings->drdy_mask.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1966:2: note: Taking false branch
if (hw->settings->drdy_mask.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1974:8: note: Calling 'st_lsm6dsx_init_shub'
err = st_lsm6dsx_init_shub(hw);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1781:7: note: Assuming the condition is false
if ((dev_fwnode(dev) && device_property_read_bool(dev, "st,pullups")) ||
^~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1781:23: note: Left side of '&&' is false
if ((dev_fwnode(dev) && device_property_read_bool(dev, "st,pullups")) ||
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1782:7: note: Assuming 'pdata' is null
(pdata && pdata->pullups)) {
^~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1782:13: note: Left side of '&&' is false
(pdata && pdata->pullups)) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1801:6: note: Assuming field 'addr' is not equal to 0
if (hub_settings->aux_sens.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1801:2: note: Taking true branch
if (hub_settings->aux_sens.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1804:7: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1804:3: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1807:10: note: The result of the left shift is undefined due to shifting '3' by '31', which is unrepresentable in the unsigned version of the return type 'int'
data = ST_LSM6DSX_SHIFT_VAL(3, hub_settings->aux_sens.mask);
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx.h:65:49: note: expanded from macro 'ST_LSM6DSX_SHIFT_VAL'
#define ST_LSM6DSX_SHIFT_VAL(val, mask) (((val) << __ffs(mask)) & (mask))
~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/hwtracing/coresight/coresight-cti-core.c:447:2: warning: Value stored to 'reg_value' is never read [clang-analyzer-deadcode.DeadStores]
reg_value = config->ctiappset;
^ ~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-core.c:447:2: note: Value stored to 'reg_value' is never read
reg_value = config->ctiappset;
^ ~~~~~~~~~~~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
84 warnings generated.
>> drivers/hwtracing/coresight/coresight-cti-sysfs.c:94:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", enabled);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:94:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", enabled);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:96:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!enable_req);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:96:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!enable_req);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:132:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", powered);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:132:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", powered);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:141:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drvdata->ctidev.ctm_id);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:141:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drvdata->ctidev.ctm_id);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:151:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drvdata->ctidev.nr_trig_con);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:151:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drvdata->ctidev.nr_trig_con);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:184:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devaff0, CTIDEVAFF0);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:184:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devaff0, CTIDEVAFF0);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:185:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devaff1, CTIDEVAFF1);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:185:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devaff1, CTIDEVAFF1);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:186:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(authstatus, CORESIGHT_AUTHSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:186:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(authstatus, CORESIGHT_AUTHSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:187:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devarch, CORESIGHT_DEVARCH);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:187:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devarch, CORESIGHT_DEVARCH);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:188:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devid, CORESIGHT_DEVID);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:188:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devid, CORESIGHT_DEVID);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:189:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devtype, CORESIGHT_DEVTYPE);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:189:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devtype, CORESIGHT_DEVTYPE);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
--
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:193:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(pidr3, CORESIGHT_PERIPHIDR3);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:193:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(pidr3, CORESIGHT_PERIPHIDR3);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:194:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(pidr4, CORESIGHT_PERIPHIDR4);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:194:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(pidr4, CORESIGHT_PERIPHIDR4);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#x\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#x\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:294:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:294:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:328:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:328:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:367:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:367:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:457:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(triginstatus, CTITRIGINSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:457:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(triginstatus, CTITRIGINSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:458:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(trigoutstatus, CTITRIGOUTSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:458:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(trigoutstatus, CTITRIGOUTSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:459:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(chinstatus, CTICHINSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:459:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(chinstatus, CTICHINSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:460:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(choutstatus, CTICHOUTSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:460:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(choutstatus, CTICHOUTSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
>> drivers/hwtracing/coresight/coresight-cti-sysfs.c:575:10: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
items = sscanf(buf, "%d %d", &chan_idx, &trig_idx);
^~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:575:10: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
items = sscanf(buf, "%d %d", &chan_idx, &trig_idx);
^~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:644:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size = sprintf(buf, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:644:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size = sprintf(buf, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:719:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:719:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:820:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:820:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:836:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "%d ", reg_idx);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:836:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "%d ", reg_idx);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:839:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:839:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:856:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "%d ", reg_idx);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:856:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "%d ", reg_idx);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:859:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:859:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:890:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
size = sprintf(buf, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:890:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
size = sprintf(buf, "\n");
^~~~~~~
>> drivers/hwtracing/coresight/coresight-cti-sysfs.c:949:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", con->con_dev_name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:949:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", con->con_dev_name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1004:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "%s ", name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1004:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "%s ", name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1006:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1006:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1022:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "%s ", name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1022:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "%s ", name);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1024:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:1024:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
used += sprintf(buf + used, "\n");
^~~~~~~
drivers/hwtracing/coresight/coresight-cti.h:238:9: warning: Access to field 'hw_powered' results in a dereference of a null pointer (loaded from variable 'cfg') [clang-analyzer-core.NullDereference]
return cfg->hw_powered && cfg->hw_enabled;
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:410:1: note: Calling 'cti_reg32_store'
cti_config_reg32_rw(appset, ctiappset, CTIAPPSET);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:281:9: note: expanded from macro 'cti_config_reg32_rw'
return cti_reg32_store(dev, buf, size, \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:247:2: note: 'drvdata' initialized here
struct cti_drvdata *drvdata = dev_get_drvdata(dev->parent);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:248:2: note: 'config' initialized here
struct cti_config *config = &drvdata->config;
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:250:6: note: Calling 'kstrtoul'
if (kstrtoul(buf, 0, &val))
^~~~~~~~~~~~~~~~~~~~~~
include/linux/kstrtox.h:36:58: note: Left side of '&&' is false
if (sizeof(unsigned long) == sizeof(unsigned long long) &&
^
include/linux/kstrtox.h:40:3: note: Returning value, which participates in a condition later
return _kstrtoul(s, base, res);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:250:6: note: Returning from 'kstrtoul'
if (kstrtoul(buf, 0, &val))
^~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:250:6: note: Assuming the condition is false
if (kstrtoul(buf, 0, &val))
^~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:250:2: note: Taking false branch
if (kstrtoul(buf, 0, &val))
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:255:6: note: Assuming 'pcached_val' is null
if (pcached_val)
^~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:255:6: note: Assuming pointer value is null
if (pcached_val)
^~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:255:2: note: Taking false branch
if (pcached_val)
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:259:7: note: 'reg_offset' is >= 0
if ((reg_offset >= 0) && cti_active(config))
^~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:259:6: note: Left side of '&&' is true
if ((reg_offset >= 0) && cti_active(config))
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:259:38: note: Passing value via 1st parameter 'cfg'
if ((reg_offset >= 0) && cti_active(config))
^~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:259:27: note: Calling 'cti_active'
if ((reg_offset >= 0) && cti_active(config))
^~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti.h:238:9: note: Access to field 'hw_powered' results in a dereference of a null pointer (loaded from variable 'cfg')
return cfg->hw_powered && cfg->hw_enabled;
^~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
sound/pci/ac97/ac97_pcm.c:448:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(avail_slots, 0, sizeof(avail_slots));
^~~~~~
sound/pci/ac97/ac97_pcm.c:448:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(avail_slots, 0, sizeof(avail_slots));
^~~~~~
sound/pci/ac97/ac97_pcm.c:449:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rate_table, 0, sizeof(rate_table));
^~~~~~
sound/pci/ac97/ac97_pcm.c:449:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rate_table, 0, sizeof(rate_table));
--
45 warnings generated.
drivers/hwmon/adt7411.c:172:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret < 0 ? ret : sprintf(buf, "%u\n", !!(ret & attr2->nr));
^~~~~~~
drivers/hwmon/adt7411.c:172:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret < 0 ? ret : sprintf(buf, "%u\n", !!(ret & attr2->nr));
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/hwmon/adt7470.c:481:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->auto_update_interval);
^~~~~~~
drivers/hwmon/adt7470.c:481:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->auto_update_interval);
^~~~~~~
drivers/hwmon/adt7470.c:512:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->num_temp_sensors);
^~~~~~~
drivers/hwmon/adt7470.c:512:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->num_temp_sensors);
^~~~~~~
drivers/hwmon/adt7470.c:599:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", data->alarms_mask);
^~~~~~~
drivers/hwmon/adt7470.c:599:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", data->alarms_mask);
^~~~~~~
drivers/hwmon/adt7470.c:699:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->force_pwm_max);
^~~~~~~
drivers/hwmon/adt7470.c:699:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->force_pwm_max);
^~~~~~~
drivers/hwmon/adt7470.c:865:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->pwm_max[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:865:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->pwm_max[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:900:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->pwm_min[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:900:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->pwm_min[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:936:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1000 * (20 + data->pwm_tmin[attr->index]));
^~~~~~~
drivers/hwmon/adt7470.c:936:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1000 * (20 + data->pwm_tmin[attr->index]));
^~~~~~~
drivers/hwmon/adt7470.c:948:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1000 * data->pwm_tmin[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:948:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1000 * data->pwm_tmin[attr->index]);
^~~~~~~
drivers/hwmon/adt7470.c:987:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", 1 << (ctrl - 1));
^~~~~~~
drivers/hwmon/adt7470.c:987:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", 1 << (ctrl - 1));
^~~~~~~
drivers/hwmon/adt7470.c:989:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7470_PWM_ALL_TEMPS);
^~~~~~~
drivers/hwmon/adt7470.c:989:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7470_PWM_ALL_TEMPS);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/hwtracing/coresight/coresight-config.c:167:4: warning: Value stored to 'name' is never read [clang-analyzer-deadcode.DeadStores]
name = feat_csdev->feat_desc->params_desc[j].name;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-config.c:167:4: note: Value stored to 'name' is never read
name = feat_csdev->feat_desc->params_desc[j].name;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-config.c:206:4: warning: Value stored to 'name' is never read [clang-analyzer-deadcode.DeadStores]
name = feat_csdev->feat_desc->params_desc[j].name;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-config.c:206:4: note: Value stored to 'name' is never read
name = feat_csdev->feat_desc->params_desc[j].name;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-config.c:234:3: warning: Value stored to 'csdev' is never read [clang-analyzer-deadcode.DeadStores]
csdev = feat_csdev->csdev;
^ ~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-config.c:234:3: note: Value stored to 'csdev' is never read
csdev = feat_csdev->csdev;
^ ~~~~~~~~~~~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
>> drivers/hwtracing/coresight/coresight-syscfg-configfs.c:195:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, CONFIGFS_ITEM_NAME_LEN, "preset%d", preset_num);
^~~~~~~~
drivers/hwtracing/coresight/coresight-syscfg-configfs.c:195:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, CONFIGFS_ITEM_NAME_LEN, "preset%d", preset_num);
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/iio/industrialio-core.c:403:33: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
iio_dev_opaque->read_buf_len = snprintf(iio_dev_opaque->read_buf,
^~~~~~~~
drivers/iio/industrialio-core.c:403:33: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
iio_dev_opaque->read_buf_len = snprintf(iio_dev_opaque->read_buf,
^~~~~~~~
drivers/iio/industrialio-core.c:427:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%i %i", ®, &val);
^~~~~~
drivers/iio/industrialio-core.c:427:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%i %i", ®, &val);
^~~~~~
drivers/iio/industrialio-core.c:750:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", this_attr->c->extend_name);
^~~~~~~
drivers/iio/industrialio-core.c:750:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", this_attr->c->extend_name);
^~~~~~~
drivers/iio/industrialio-core.c:984:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%c", &ch) != 1)
^~~~~~
drivers/iio/industrialio-core.c:984:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%c", &ch) != 1)
^~~~~~
drivers/iio/industrialio-core.c:1458:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, name, sz);
^~~~~~
drivers/iio/industrialio-core.c:1458:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, name, sz);
^~~~~~
drivers/iio/industrialio-core.c:1567:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iio_dev_opaque->chan_attr_group.attrs,
^~~~~~
drivers/iio/industrialio-core.c:1567:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iio_dev_opaque->chan_attr_group.attrs,
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/memstick/core/mspro_block.c:446:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, x_spfile->name, 8);
^~~~~~
drivers/memstick/core/mspro_block.c:446:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, x_spfile->name, 8);
^~~~~~
drivers/memstick/core/mspro_block.c:448:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ext, x_spfile->ext, 3);
^~~~~~
drivers/memstick/core/mspro_block.c:448:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ext, x_spfile->ext, 3);
^~~~~~
drivers/memstick/core/mspro_block.c:1047:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(s_attr->name, sizeof(s_attr->name), "%s",
^~~~~~~~
drivers/memstick/core/mspro_block.c:1047:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(s_attr->name, sizeof(s_attr->name), "%s",
^~~~~~~~
drivers/memstick/core/mspro_block.c:1050:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(s_attr->name, sizeof(s_attr->name),
^~~~~~~~
drivers/memstick/core/mspro_block.c:1050:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(s_attr->name, sizeof(s_attr->name),
^~~~~~~~
drivers/memstick/core/mspro_block.c:1070:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s_attr->data, buffer + addr % msb->page_size,
^~~~~~
drivers/memstick/core/mspro_block.c:1070:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s_attr->data, buffer + addr % msb->page_size,
^~~~~~
drivers/memstick/core/mspro_block.c:1106:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s_attr->data, buffer + addr % msb->page_size,
^~~~~~
drivers/memstick/core/mspro_block.c:1106:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s_attr->data, buffer + addr % msb->page_size,
^~~~~~
drivers/memstick/core/mspro_block.c:1232:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(msb->disk->disk_name, "mspblk%d", disk_id);
^~~~~~~
drivers/memstick/core/mspro_block.c:1232:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(msb->disk->disk_name, "mspblk%d", disk_id);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:837:19: note: Calling 'devm_kcalloc'
adc->iio_chans = devm_kcalloc(adc->dev, adc->nchans,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:9: note: Calling 'devm_kmalloc_array'
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:216:2: note: Taking false branch
if (unlikely(check_mul_overflow(n, size, &bytes)))
^
include/linux/device.h:219:2: note: Returning pointer, which participates in a condition later
return devm_kmalloc(dev, bytes, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:9: note: Returning from 'devm_kmalloc_array'
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:2: note: Returning pointer, which participates in a condition later
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:837:19: note: Returning from 'devm_kcalloc'
adc->iio_chans = devm_kcalloc(adc->dev, adc->nchans,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:839:6: note: Assuming field 'iio_chans' is non-null
if (!adc->iio_chans)
^~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:839:2: note: Taking false branch
if (!adc->iio_chans)
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:842:15: note: Calling 'devm_kcalloc'
adc->chans = devm_kcalloc(adc->dev, adc->nchans,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:9: note: Calling 'devm_kmalloc_array'
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:216:2: note: Taking false branch
if (unlikely(check_mul_overflow(n, size, &bytes)))
^
include/linux/device.h:219:2: note: Returning pointer, which participates in a condition later
return devm_kmalloc(dev, bytes, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:9: note: Returning from 'devm_kmalloc_array'
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:224:2: note: Returning pointer, which participates in a condition later
return devm_kmalloc_array(dev, n, size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:842:15: note: Returning from 'devm_kcalloc'
adc->chans = devm_kcalloc(adc->dev, adc->nchans,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:844:6: note: Assuming field 'chans' is non-null
if (!adc->chans)
^~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:844:2: note: Taking false branch
if (!adc->chans)
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:848:39: note: Assuming 'child' is not equal to null
for_each_available_child_of_node(np, child) {
^
include/linux/of.h:1371:58: note: expanded from macro 'for_each_available_child_of_node'
for (child = of_get_next_available_child(parent, NULL); child != NULL; \
^~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:848:2: note: Loop condition is true. Entering loop body
for_each_available_child_of_node(np, child) {
^
include/linux/of.h:1371:2: note: expanded from macro 'for_each_available_child_of_node'
for (child = of_get_next_available_child(parent, NULL); child != NULL; \
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:851:8: note: Passing value via 3rd parameter 'hw_channels'
adc->variant->channels,
^~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:850:9: note: Calling 'pm8xxx_xoadc_parse_channel'
ret = pm8xxx_xoadc_parse_channel(adc->dev, child,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:746:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:746:2: note: Taking false branch
if (ret) {
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:751:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:751:2: note: Taking false branch
if (ret) {
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:758:2: note: Value assigned to 'hwchan'
hwchan = &hw_channels[0];
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:759:9: note: Assuming 'hwchan' is null
while (hwchan && hwchan->datasheet_name) {
^~~~~~
drivers/iio/adc/qcom-pm8xxx-xoadc.c:759:16: note: Left side of '&&' is false
while (hwchan && hwchan->datasheet_name) {
^
drivers/iio/adc/qcom-pm8xxx-xoadc.c:767:7: note: Access to field 'datasheet_name' results in a dereference of a null pointer (loaded from variable 'hwchan')
if (!hwchan->datasheet_name) {
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> sound/arm/aaci.c:846:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ac97_template, 0, sizeof(struct snd_ac97_template));
^~~~~~
sound/arm/aaci.c:846:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ac97_template, 0, sizeof(struct snd_ac97_template));
^~~~~~
>> sound/arm/aaci.c:895:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(card->longname, sizeof(card->longname),
^~~~~~~~
sound/arm/aaci.c:895:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(card->longname, sizeof(card->longname),
^~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
sound/core/init.c:306:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(card->irq_descr, sizeof(card->irq_descr), "%s:%s",
^~~~~~~~
sound/core/init.c:306:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(card->irq_descr, sizeof(card->irq_descr), "%s:%s",
^~~~~~~~
sound/core/init.c:691:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(id, "Default");
^~~~~~
sound/core/init.c:691:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(id, "Default");
^~~~~~
sound/core/init.c:705:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(sfxstr, "_%X", loops + 1);
^~~~~~~
sound/core/init.c:705:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(sfxstr, "_%X", loops + 1);
^~~~~~~
sound/core/init.c:711:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(spos, sfxstr);
^~~~~~
sound/core/init.c:711:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(spos, sfxstr);
^~~~~~
sound/core/init.c:765:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf1, buf, copy);
^~~~~~
sound/core/init.c:765:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf1, buf, copy);
^~~~~~
sound/core/init.c:772:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(card->id, buf1);
^~~~~~
sound/core/init.c:772:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(card->id, buf1);
^~~~~~
sound/core/init.c:874:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmpid, card->id, sizeof(card->id));
^~~~~~
sound/core/init.c:874:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmpid, card->id, sizeof(card->id));
^~~~~~
sound/core/init.c:1013:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(card->components, " ");
^~~~~~
sound/core/init.c:1013:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(card->components, " ");
^~~~~~
sound/core/init.c:1014:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(card->components, component);
^~~~~~
sound/core/init.c:1014:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(card->components, component);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/scsi/libsas/sas_scsi_host.c:87:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sc->sense_buffer, ts->buf,
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:87:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sc->sense_buffer, ts->buf,
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(task->ssp_task.LUN, &lun.scsi_lun, 8);
^~~~~~
drivers/scsi/libsas/sas_scsi_host.c:150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(task->ssp_task.LUN, &lun.scsi_lun, 8);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/scsi/libsas/sas_task.c:27:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tstat->buf, iu->sense_data, tstat->buf_valid_size);
^~~~~~
drivers/scsi/libsas/sas_task.c:27:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tstat->buf, iu->sense_data, tstat->buf_valid_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/md/dm-table.c:117:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n_highs, -1, sizeof(*n_highs) * num);
^~~~~~
drivers/md/dm-table.c:117:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n_highs, -1, sizeof(*n_highs) * num);
^~~~~~
drivers/md/dm-table.c:359:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(path, "%u:%u%c", &major, &minor, &dummy) == 2) {
^~~~~~
drivers/md/dm-table.c:359:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(path, "%u:%u%c", &major, &minor, &dummy) == 2) {
^~~~~~
drivers/md/dm-table.c:491:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(argv, old_argv, *size * sizeof(*argv));
^~~~~~
drivers/md/dm-table.c:491:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(argv, old_argv, *size * sizeof(*argv));
^~~~~~
drivers/md/dm-table.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tgt, 0, sizeof(*tgt));
^~~~~~
drivers/md/dm-table.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tgt, 0, sizeof(*tgt));
^~~~~~
drivers/md/dm-table.c:743:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
(sscanf(arg_str, "%u%c", value, &dummy) != 1) ||
^~~~~~
drivers/md/dm-table.c:743:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
(sscanf(arg_str, "%u%c", value, &dummy) != 1) ||
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/hwtracing/coresight/coresight-tmc-core.c:298:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-tmc-core.c:298:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-tmc-core.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#x\n", drvdata->size);
^~~~~~~
drivers/hwtracing/coresight/coresight-tmc-core.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#x\n", drvdata->size);
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/soundwire/master.c:47:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(revision, "0x%x\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:47:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(revision, "0x%x\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:48:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(clk_stop_modes, "0x%x\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:48:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(clk_stop_modes, "0x%x\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:49:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(max_clk_freq, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:49:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(max_clk_freq, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:50:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(default_row, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:50:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(default_row, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:51:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(default_col, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:51:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(default_col, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:52:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(default_frame_rate, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:52:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(default_frame_rate, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:53:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(dynamic_frame, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:53:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_master_attr(dynamic_frame, "%d\n");
^
drivers/soundwire/master.c:43:9: note: expanded from macro 'sdw_master_attr'
return sprintf(buf, format_string, md->bus->prop.field); \
^~~~~~~
drivers/soundwire/master.c:54:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_master_attr(err_threshold, "%d\n");
--
^~~
fs/ext4/readpage.c:357:11: note: Left side of '&&' is false
if (bio && (last_block_in_bio != blocks[0] - 1 ||
^
fs/ext4/readpage.c:363:7: note: 'bio' is equal to NULL
if (bio == NULL) {
^~~
fs/ext4/readpage.c:363:3: note: Taking true branch
if (bio == NULL) {
^
fs/ext4/readpage.c:373:39: note: The left operand of '<<' is a garbage value
bio->bi_iter.bi_sector = blocks[0] << (blkbits - 9);
~~~~~~~~~ ^
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/chemical/atlas-ezo-sensor.c:108:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(ptr, ptr + 1, strlen(ptr));
^~~~~~~
drivers/iio/chemical/atlas-ezo-sensor.c:108:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(ptr, ptr + 1, strlen(ptr));
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
drivers/iio/chemical/pms7003.c:243:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(frame->data + frame->length, buf, num);
^~~~~~
drivers/iio/chemical/pms7003.c:243:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(frame->data + frame->length, buf, num);
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/hid/hid-quirks.c:1170:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
m = sscanf(quirks_param[n], "0x%hx:0x%hx:0x%x",
^~~~~~
drivers/hid/hid-quirks.c:1170:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
m = sscanf(quirks_param[n], "0x%hx:0x%hx:0x%x",
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/hid/hid-debug.c:495:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE, "%s",
^~~~~~~~
drivers/hid/hid-debug.c:495:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE, "%s",
^~~~~~~~
drivers/hid/hid-debug.c:505:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE, "%04x", page);
^~~~~~~~
drivers/hid/hid-debug.c:505:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE, "%04x", page);
^~~~~~~~
drivers/hid/hid-debug.c:535:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len,
^~~~~~~~
drivers/hid/hid-debug.c:535:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len,
^~~~~~~~
drivers/hid/hid-debug.c:547:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len, HID_DEBUG_BUFSIZE - len, "%04x",
^~~~~~~~
drivers/hid/hid-debug.c:547:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len, HID_DEBUG_BUFSIZE - len, "%04x",
^~~~~~~~
drivers/hid/hid-debug.c:717:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:717:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:723:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:723:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, HID_DEBUG_BUFSIZE - 1,
^~~~~~~~
drivers/hid/hid-debug.c:741:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf + len, HID_DEBUG_BUFSIZE - len - 1, " = %d\n", value);
^~~~~~~~
drivers/hid/hid-debug.c:741:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf + len, HID_DEBUG_BUFSIZE - len - 1, " = %d\n", value);
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> drivers/media/mmc/siano/smssdio.c:253:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(struct smsdevice_params_t));
^~~~~~
drivers/media/mmc/siano/smssdio.c:253:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(struct smsdevice_params_t));
^~~~~~
>> drivers/media/mmc/siano/smssdio.c:260:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(params.devpath, sizeof(params.devpath),
^~~~~~~~
drivers/media/mmc/siano/smssdio.c:260:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(params.devpath, sizeof(params.devpath),
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/test-drivers/vimc/vimc-core.c:29:8: warning: Excessive padding in 'struct vimc_ent_link' (4 padding bytes, where 0 is optimal).
Optimal fields order:
src_ent,
sink_ent,
flags,
src_pad,
sink_pad,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct vimc_ent_link {
~~~~~~~^~~~~~~~~~~~~~~
drivers/media/test-drivers/vimc/vimc-core.c:29:8: note: Excessive padding in 'struct vimc_ent_link' (4 padding bytes, where 0 is optimal). Optimal fields order: src_ent, sink_ent, flags, src_pad, sink_pad, consider reordering the fields or adding explicit padding members
struct vimc_ent_link {
~~~~~~~^~~~~~~~~~~~~~~
drivers/media/test-drivers/vimc/vimc-core.c:293:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(vimc->mdev.bus_info, sizeof(vimc->mdev.bus_info),
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-core.c:293:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(vimc->mdev.bus_info, sizeof(vimc->mdev.bus_info),
^~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/md/persistent-data/dm-transaction-manager.c:296:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dm_block_data(*result), dm_block_data(orig_block),
^~~~~~
drivers/md/persistent-data/dm-transaction-manager.c:296:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dm_block_data(*result), dm_block_data(orig_block),
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
drivers/md/persistent-data/dm-btree.c:22:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dest, src, len);
^~~~~~
drivers/md/persistent-data/dm-btree.c:22:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dest, src, len);
^~~~~~
drivers/md/persistent-data/dm-btree.c:31:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(base + (elt_size * (index + 1)),
^~~~~~~
drivers/md/persistent-data/dm-btree.c:31:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(base + (elt_size * (index + 1)),
^~~~~~~
drivers/md/persistent-data/dm-btree.c:142:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, block_size);
^~~~~~
drivers/md/persistent-data/dm-btree.c:142:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, block_size);
^~~~~~
drivers/md/persistent-data/dm-btree.c:366:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, value_ptr(ro_node(s), i), value_size);
^~~~~~
drivers/md/persistent-data/dm-btree.c:366:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(v, value_ptr(ro_node(s), i), value_size);
^~~~~~
drivers/md/persistent-data/dm-btree.c:408:8: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
root = le64_to_cpu(internal_value_le);
^
drivers/md/persistent-data/dm-btree.c:377:2: note: 'internal_value_le' declared without an initial value
__le64 internal_value_le;
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/persistent-data/dm-btree.c:381:18: note: Assuming 'level' is < field 'levels'
for (level = 0; level < info->levels; level++) {
^~~~~~~~~~~~~~~~~~~~
drivers/md/persistent-data/dm-btree.c:381:2: note: Loop condition is true. Entering loop body
for (level = 0; level < info->levels; level++) {
^
drivers/md/persistent-data/dm-btree.c:385:7: note: Assuming 'level' is equal to 'last_level'
if (level == last_level) {
^~~~~~~~~~~~~~~~~~~
drivers/md/persistent-data/dm-btree.c:385:3: note: Taking true branch
if (level == last_level) {
^
drivers/md/persistent-data/dm-btree.c:398:7: note: Assuming 'r' is 0
if (!r) {
^~
drivers/md/persistent-data/dm-btree.c:398:3: note: Taking true branch
if (!r) {
^
drivers/md/persistent-data/dm-btree.c:399:8: note: Assuming the condition is false
if (rkey != keys[level]) {
^~~~~~~~~~~~~~~~~~~
drivers/md/persistent-data/dm-btree.c:399:4: note: Taking false branch
if (rkey != keys[level]) {
^
drivers/md/persistent-data/dm-btree.c:408:8: note: Assigned value is garbage or undefined
root = le64_to_cpu(internal_value_le);
^
drivers/md/persistent-data/dm-btree.c:460:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
^
drivers/scsi/sg.c:2088:18: note: Access to field 'res_in_use' results in a dereference of a null pointer (loaded from variable 'sfp')
sfp->res_in_use = 0;
~~~ ^
drivers/scsi/sg.c:2131:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rp, 0, sizeof (Sg_request));
^~~~~~
drivers/scsi/sg.c:2131:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rp, 0, sizeof (Sg_request));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/dvb-frontends/stv6110x.c:75:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[1], data, len);
^~~~~~
drivers/media/dvb-frontends/stv6110x.c:75:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[1], data, len);
^~~~~~
drivers/media/dvb-frontends/stv6110x.c:340:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stv6110x->regs, default_regs, 8);
^~~~~~
drivers/media/dvb-frontends/stv6110x.c:340:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stv6110x->regs, default_regs, 8);
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/media/dvb-frontends/m88ds3103.c:37:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:37:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:173:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:173:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:379:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:379:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:385:6: warning: Value stored to 'old_setting' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
u32 old_setting = dev->mclk;
^~~~~~~~~~~ ~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:385:6: note: Value stored to 'old_setting' during its initialization is never read
u32 old_setting = dev->mclk;
^~~~~~~~~~~ ~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:621:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:621:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:895:3: warning: Value stored to 'u16tmp' is never read [clang-analyzer-deadcode.DeadStores]
u16tmp = 0;
^ ~
drivers/media/dvb-frontends/m88ds3103.c:895:3: note: Value stored to 'u16tmp' is never read
u16tmp = 0;
^ ~
drivers/media/dvb-frontends/m88ds3103.c:1141:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1141:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1180:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1180:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1370:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1370:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1416:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1416:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1466:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1466:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1545:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1545:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = dev->client;
^~~~~~ ~~~~~~~~~~~
>> drivers/media/dvb-frontends/m88ds3103.c:1687:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&board_info, 0, sizeof(board_info));
^~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1687:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&board_info, 0, sizeof(board_info));
^~~~~~
>> drivers/media/dvb-frontends/m88ds3103.c:1874:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &m88ds3103_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1874:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &m88ds3103_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/cec/core/cec-api.c:156:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&log_addrs, &adap->log_addrs, sizeof(log_addrs));
^~~~~~
drivers/media/cec/core/cec-api.c:156:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&log_addrs, &adap->log_addrs, sizeof(log_addrs));
^~~~~~
drivers/media/cec/core/cec-api.c:158:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(log_addrs.log_addr, CEC_LOG_ADDR_INVALID,
^~~~~~
drivers/media/cec/core/cec-api.c:158:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(log_addrs.log_addr, CEC_LOG_ADDR_INVALID,
^~~~~~
include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
__list_del(entry->prev, entry->next);
^
drivers/media/cec/core/cec-api.c:645:6: note: Assuming 'fh' is not equal to field 'cec_initiator'
if (adap->cec_initiator == fh)
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:645:2: note: Taking false branch
if (adap->cec_initiator == fh)
^
drivers/media/cec/core/cec-api.c:647:6: note: Assuming 'fh' is not equal to field 'cec_follower'
if (adap->cec_follower == fh) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:647:2: note: Taking false branch
if (adap->cec_follower == fh) {
^
drivers/media/cec/core/cec-api.c:651:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_FOLLOWER)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:651:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_FOLLOWER)
^
drivers/media/cec/core/cec-api.c:653:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_MONITOR_PIN)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:653:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_MONITOR_PIN)
^
drivers/media/cec/core/cec-api.c:655:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_MONITOR_ALL)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:655:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_MONITOR_ALL)
^
drivers/media/cec/core/cec-api.c:664:6: note: Assuming the condition is false
if (cec_is_registered(adap) && list_empty(&devnode->fhs) &&
^~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:664:30: note: Left side of '&&' is false
if (cec_is_registered(adap) && list_empty(&devnode->fhs) &&
^
drivers/media/cec/core/cec-api.c:672:2: note: Loop condition is false. Execution continues on line 680
while (!list_empty(&fh->xfer_list)) {
^
drivers/media/cec/core/cec-api.c:681:2: note: Loop condition is true. Entering loop body
while (!list_empty(&fh->msgs)) {
^
drivers/media/cec/core/cec-api.c:686:3: note: Memory is released
kfree(entry);
^~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:681:2: note: Loop condition is true. Entering loop body
while (!list_empty(&fh->msgs)) {
^
drivers/media/cec/core/cec-api.c:685:3: note: Calling 'list_del'
list_del(&entry->list);
^~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:148:2: note: Calling '__list_del_entry'
__list_del_entry(entry);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:6: note: Assuming the condition is false
if (!__list_del_entry_valid(entry))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:2: note: Taking false branch
if (!__list_del_entry_valid(entry))
^
include/linux/list.h:137:13: note: Use of memory after it is freed
__list_del(entry->prev, entry->next);
^~~~~~~~~~~
include/linux/list.h:149:14: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
entry->next = LIST_POISON1;
^
drivers/media/cec/core/cec-api.c:645:6: note: Assuming 'fh' is not equal to field 'cec_initiator'
if (adap->cec_initiator == fh)
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:645:2: note: Taking false branch
if (adap->cec_initiator == fh)
^
drivers/media/cec/core/cec-api.c:647:6: note: Assuming 'fh' is not equal to field 'cec_follower'
if (adap->cec_follower == fh) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:647:2: note: Taking false branch
if (adap->cec_follower == fh) {
^
drivers/media/cec/core/cec-api.c:651:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_FOLLOWER)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:651:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_FOLLOWER)
^
drivers/media/cec/core/cec-api.c:653:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_MONITOR_PIN)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:653:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_MONITOR_PIN)
^
drivers/media/cec/core/cec-api.c:655:6: note: Assuming the condition is false
if (fh->mode_follower == CEC_MODE_MONITOR_ALL)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:655:2: note: Taking false branch
if (fh->mode_follower == CEC_MODE_MONITOR_ALL)
^
drivers/media/cec/core/cec-api.c:664:6: note: Assuming the condition is false
if (cec_is_registered(adap) && list_empty(&devnode->fhs) &&
^~~~~~~~~~~~~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:664:30: note: Left side of '&&' is false
if (cec_is_registered(adap) && list_empty(&devnode->fhs) &&
^
drivers/media/cec/core/cec-api.c:672:2: note: Loop condition is false. Execution continues on line 680
while (!list_empty(&fh->xfer_list)) {
^
drivers/media/cec/core/cec-api.c:681:2: note: Loop condition is true. Entering loop body
while (!list_empty(&fh->msgs)) {
^
drivers/media/cec/core/cec-api.c:686:3: note: Memory is released
kfree(entry);
^~~~~~~~~~~~
drivers/media/cec/core/cec-api.c:681:2: note: Loop condition is true. Entering loop body
while (!list_empty(&fh->msgs)) {
^
drivers/media/cec/core/cec-api.c:685:3: note: Calling 'list_del'
list_del(&entry->list);
^~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/mtd/ubi/io.c:321:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/ubi/io.c:321:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei, 0, sizeof(struct erase_info));
^~~~~~
drivers/mtd/ubi/io.c:391:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ubi->peb_buf, patterns[i], ubi->peb_size);
^~~~~~
drivers/mtd/ubi/io.c:391:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ubi->peb_buf, patterns[i], ubi->peb_size);
^~~~~~
drivers/mtd/ubi/io.c:396:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ubi->peb_buf, ~patterns[i], ubi->peb_size);
^~~~~~
drivers/mtd/ubi/io.c:396:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ubi->peb_buf, ~patterns[i], ubi->peb_size);
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/mtd/ubi/wl.c:1765:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ubi->bgt_name, UBI_BGT_NAME_PATTERN, ubi->ubi_num);
^~~~~~~
drivers/mtd/ubi/wl.c:1765:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ubi->bgt_name, UBI_BGT_NAME_PATTERN, ubi->ubi_num);
^~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/leds/leds-lp8501.c:223:9: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(data + offset, "%2s%n ", c, &nrchars);
^~~~~~
drivers/leds/leds-lp8501.c:223:9: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(data + offset, "%2s%n ", c, &nrchars);
^~~~~~
drivers/leds/leds-lp8501.c:227:9: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(c, "%2x", &cmd);
^~~~~~
drivers/leds/leds-lp8501.c:227:9: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(c, "%2x", &cmd);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
sound/soc/codecs/wm8731.c:106:3: warning: Value stored to 'best' is never read [clang-analyzer-deadcode.DeadStores]
best = 0;
^ ~
sound/soc/codecs/wm8731.c:106:3: note: Value stored to 'best' is never read
best = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
lib/seq_buf.c:64:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt, args);
^~~~~~~~~
lib/seq_buf.c:64:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt, args);
^~~~~~~~~
lib/seq_buf.c:152:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:152:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:199:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, mem, len);
^~~~~~
lib/seq_buf.c:199:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->buffer + s->len, mem, len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/i2c/cx25840/cx25840-firmware.c:131:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + 2, ptr, len);
^~~~~~
drivers/media/i2c/cx25840/cx25840-firmware.c:131:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + 2, ptr, len);
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/i2c/cx25840/cx25840-vbi.c:86:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(svbi->service_lines, 0, sizeof(svbi->service_lines));
^~~~~~
drivers/media/i2c/cx25840/cx25840-vbi.c:86:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(svbi->service_lines, 0, sizeof(svbi->service_lines));
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/core/pcm_native.c:220:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
sound/core/pcm_native.c:220:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, sizeof(*info));
--
NAND_COMMON_TIMING_NS(conf, tADL_min)),
^
include/linux/mtd/rawnand.h:587:2: note: expanded from macro 'NAND_COMMON_TIMING_NS'
PSEC_TO_NSEC(NAND_COMMON_TIMING_PS((conf), timing_name))
^
include/linux/mtd/rawnand.h:769:25: note: expanded from macro 'PSEC_TO_NSEC'
#define PSEC_TO_NSEC(x) __DIVIDE(x, 1000)
^
include/linux/mtd/rawnand.h:765:25: note: expanded from macro '__DIVIDE'
(__typeof__(dividend))(sizeof(dividend) <= sizeof(unsigned long) ? \
^
drivers/mtd/nand/raw/nand_base.c:1701:10: note: '?' condition is true
NAND_COMMON_TIMING_NS(conf, tADL_min)),
^
include/linux/mtd/rawnand.h:587:15: note: expanded from macro 'NAND_COMMON_TIMING_NS'
PSEC_TO_NSEC(NAND_COMMON_TIMING_PS((conf), timing_name))
^
include/linux/mtd/rawnand.h:579:2: note: expanded from macro 'NAND_COMMON_TIMING_PS'
nand_interface_is_sdr(conf) ? \
^
drivers/mtd/nand/raw/nand_base.c:1708:7: note: 'len' is 2
if (len && nand_interface_is_nvddr(conf)) {
^~~
drivers/mtd/nand/raw/nand_base.c:1708:7: note: Left side of '&&' is true
drivers/mtd/nand/raw/nand_base.c:1708:14: note: Calling 'nand_interface_is_nvddr'
if (len && nand_interface_is_nvddr(conf)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/mtd/rawnand.h:633:2: note: Returning zero, which participates in a condition later
return conf->type == NAND_NVDDR_IFACE;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/nand_base.c:1708:14: note: Returning from 'nand_interface_is_nvddr'
if (len && nand_interface_is_nvddr(conf)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/nand_base.c:1708:3: note: Taking false branch
if (len && nand_interface_is_nvddr(conf)) {
^
drivers/mtd/nand/raw/nand_base.c:1718:8: note: 'len' is 2
if (!len)
^~~
drivers/mtd/nand/raw/nand_base.c:1718:3: note: Taking false branch
if (!len)
^
drivers/mtd/nand/raw/nand_base.c:1722:7: note: Assuming 'ret' is 0, which participates in a condition later
if (!ret && len && nand_interface_is_nvddr(conf)) {
^~~~
drivers/mtd/nand/raw/nand_base.c:1722:7: note: Left side of '&&' is true
drivers/mtd/nand/raw/nand_base.c:1722:15: note: 'len' is 2
if (!ret && len && nand_interface_is_nvddr(conf)) {
^~~
drivers/mtd/nand/raw/nand_base.c:1722:7: note: Left side of '&&' is true
if (!ret && len && nand_interface_is_nvddr(conf)) {
^
drivers/mtd/nand/raw/nand_base.c:1722:3: note: Taking false branch
if (!ret && len && nand_interface_is_nvddr(conf)) {
^
drivers/mtd/nand/raw/nand_base.c:1729:3: note: Returning without writing to '*buf'
return ret;
^
drivers/mtd/nand/raw/nand_base.c:1729:3: note: Returning zero (loaded from 'ret'), which participates in a condition later
return ret;
^~~~~~~~~~
drivers/mtd/nand/raw/nand_base.c:5485:9: note: Returning from 'nand_readid_op'
ret = nand_readid_op(chip, 0, id, sizeof(id));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/nand_base.c:5486:7: note: 'ret' is 0
if (ret)
^~~
drivers/mtd/nand/raw/nand_base.c:5486:3: note: Taking false branch
if (ret)
^
drivers/mtd/nand/raw/nand_base.c:5489:19: note: The right operand of '!=' is a garbage value
if (nand_maf_id != id[0] || nand_dev_id != id[1]) {
^ ~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/of/device.c:59:29: warning: Value stored to 'of_node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device_node *node, *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/of/device.c:59:29: note: Value stored to 'of_node' during its initialization is never read
struct device_node *node, *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/of/device.c:254:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
csize = snprintf(str, len, "of:N%pOFn%c%s", dev->of_node, 'T',
^~~~~~~~
drivers/of/device.c:254:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
csize = snprintf(str, len, "of:N%pOFn%c%s", dev->of_node, 'T',
^~~~~~~~
drivers/of/device.c:267:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
csize = snprintf(str, len, "C%s", compat);
^~~~~~~~
drivers/of/device.c:267:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
csize = snprintf(str, len, "C%s", compat);
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
>> drivers/scsi/ch.c:247:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:247:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
>> drivers/scsi/ch.c:264:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data,buffer+16,16);
^~~~~~
drivers/scsi/ch.c:264:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data,buffer+16,16);
^~~~~~
drivers/scsi/ch.c:284:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:284:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:304:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:304:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:429:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:429:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:448:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:448:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:471:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:471:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:519:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:519:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd,0,sizeof(cmd));
^~~~~~
drivers/scsi/ch.c:531:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer,tag,32);
^~~~~~
drivers/scsi/ch.c:531:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer,tag,32);
^~~~~~
drivers/scsi/ch.c:658:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&vparams,0,sizeof(vparams));
^~~~~~
drivers/scsi/ch.c:658:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&vparams,0,sizeof(vparams));
^~~~~~
>> drivers/scsi/ch.c:661:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(vparams.cvp_label1,vendor_labels[0],16);
^~~~~~~
drivers/scsi/ch.c:661:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(vparams.cvp_label1,vendor_labels[0],16);
^~~~~~~
drivers/scsi/ch.c:665:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(vparams.cvp_label2,vendor_labels[1],16);
^~~~~~~
drivers/scsi/ch.c:665:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(vparams.cvp_label2,vendor_labels[1],16);
^~~~~~~
drivers/scsi/ch.c:669:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(vparams.cvp_label3,vendor_labels[2],16);
^~~~~~~
drivers/scsi/ch.c:669:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(vparams.cvp_label3,vendor_labels[2],16);
^~~~~~~
drivers/scsi/ch.c:673:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(vparams.cvp_label4,vendor_labels[3],16);
^~~~~~~
drivers/scsi/ch.c:673:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(vparams.cvp_label4,vendor_labels[3],16);
^~~~~~~
drivers/scsi/ch.c:792:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ch_cmd, 0, sizeof(ch_cmd));
^~~~~~
drivers/scsi/ch.c:792:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ch_cmd, 0, sizeof(ch_cmd));
^~~~~~
drivers/scsi/ch.c:830:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cge.cge_pvoltag,buffer+28,36);
^~~~~~
drivers/scsi/ch.c:830:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cge.cge_pvoltag,buffer+28,36);
^~~~~~
drivers/scsi/ch.c:834:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cge.cge_avoltag,buffer+64,36);
^~~~~~
drivers/scsi/ch.c:834:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cge.cge_avoltag,buffer+64,36);
^~~~~~
>> drivers/scsi/ch.c:914:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ch->name,"ch%d",ch->minor);
^~~~~~~
drivers/scsi/ch.c:914:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ch->name,"ch%d",ch->minor);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
Suppressed 56 warnings (56 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/media/common/siano/smscoreapi.c:801:5: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = smscore_sendrequest_and_wait(coredev, msg,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/siano/smscoreapi.c:801:5: note: Value stored to 'rc' is never read
rc = smscore_sendrequest_and_wait(coredev, msg,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/media/common/siano/smscoreapi.c:962:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data_msg->payload, payload, payload_size);
^~~~~~
drivers/media/common/siano/smscoreapi.c:962:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data_msg->payload, payload, payload_size);
^~~~~~
drivers/media/common/siano/smscoreapi.c:1166:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fw_buf, fw->data, fw->size);
^~~~~~
drivers/media/common/siano/smscoreapi.c:1166:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fw_buf, fw->data, fw->size);
^~~~~~
drivers/media/common/siano/smscoreapi.c:1554:25: warning: Value stored to 'validity' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct sms_msg_data *validity = (struct sms_msg_data *) phdr;
^~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/common/siano/smscoreapi.c:1554:25: note: Value stored to 'validity' during its initialization is never read
struct sms_msg_data *validity = (struct sms_msg_data *) phdr;
^~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
__list_del(entry->prev, entry->next);
^
drivers/media/common/siano/smscoreapi.c:1756:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&coredev->clientslock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/media/common/siano/smscoreapi.c:1756:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&coredev->clientslock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/media/common/siano/smscoreapi.c:1759:2: note: Loop condition is true. Entering loop body
while (!list_empty(&client->idlist)) {
^
drivers/media/common/siano/smscoreapi.c:1763:3: note: Memory is released
kfree(identry);
^~~~~~~~~~~~~~
drivers/media/common/siano/smscoreapi.c:1759:2: note: Loop condition is true. Entering loop body
while (!list_empty(&client->idlist)) {
^
drivers/media/common/siano/smscoreapi.c:1762:3: note: Calling 'list_del'
list_del(&identry->entry);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:148:2: note: Calling '__list_del_entry'
__list_del_entry(entry);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:6: note: Assuming the condition is false
if (!__list_del_entry_valid(entry))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:134:2: note: Taking false branch
if (!__list_del_entry_valid(entry))
^
include/linux/list.h:137:13: note: Use of memory after it is freed
__list_del(entry->prev, entry->next);
^~~~~~~~~~~
include/linux/list.h:149:14: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
entry->next = LIST_POISON1;
^
drivers/media/common/siano/smscoreapi.c:1756:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&coredev->clientslock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/media/common/siano/smscoreapi.c:1756:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&coredev->clientslock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/media/common/siano/smscoreapi.c:1759:2: note: Loop condition is true. Entering loop body
while (!list_empty(&client->idlist)) {
^
drivers/media/common/siano/smscoreapi.c:1763:3: note: Memory is released
kfree(identry);
^~~~~~~~~~~~~~
drivers/media/common/siano/smscoreapi.c:1759:2: note: Loop condition is true. Entering loop body
while (!list_empty(&client->idlist)) {
^
drivers/media/common/siano/smscoreapi.c:1762:3: note: Calling 'list_del'
list_del(&identry->entry);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/ssb/driver_chipcommon.c:130:12: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (tmp & 0x10)
--
^
sound/soc/soc-pcm.c:1276:2: note: Loop condition is false. Execution continues on line 1294
for_each_dpcm_be_safe(fe, stream, dpcm, d) {
^
include/sound/soc-dpcm.h:114:2: note: expanded from macro 'for_each_dpcm_be_safe'
list_for_each_entry_safe(_dpcm, __dpcm, &(fe)->dpcm[stream].be_clients, list_be)
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
sound/soc/soc-pcm.c:1296:2: note: Loop condition is true. Entering loop body
while (!list_empty(&deleted_dpcms)) {
^
sound/soc/soc-pcm.c:1301:3: note: Memory is released
kfree(dpcm);
^~~~~~~~~~~
sound/soc/soc-pcm.c:1296:2: note: Loop condition is true. Entering loop body
while (!list_empty(&deleted_dpcms)) {
^
sound/soc/soc-pcm.c:1299:3: note: Calling 'list_del'
list_del(&dpcm->list_fe);
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
sound/soc/soc-pcm.c:1993:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dpcm->hw_params, &fe->dpcm[stream].hw_params,
^~~~~~
sound/soc/soc-pcm.c:1993:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dpcm->hw_params, &fe->dpcm[stream].hw_params,
^~~~~~
sound/soc/soc-pcm.c:2002:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&be->dpcm[stream].hw_params, &dpcm->hw_params,
^~~~~~
sound/soc/soc-pcm.c:2002:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&be->dpcm[stream].hw_params, &dpcm->hw_params,
^~~~~~
sound/soc/soc-pcm.c:2062:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fe->dpcm[stream].hw_params, params,
^~~~~~
sound/soc/soc-pcm.c:2062:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fe->dpcm[stream].hw_params, params,
^~~~~~
sound/soc/soc-pcm.c:2820:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(new_name, sizeof(new_name), "codec2codec(%s)",
^~~~~~~~
sound/soc/soc-pcm.c:2820:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(new_name, sizeof(new_name), "codec2codec(%s)",
^~~~~~~~
sound/soc/soc-pcm.c:2826:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(new_name, sizeof(new_name), "(%s)",
^~~~~~~~
sound/soc/soc-pcm.c:2826:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(new_name, sizeof(new_name), "(%s)",
^~~~~~~~
sound/soc/soc-pcm.c:2833:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(new_name, sizeof(new_name), "%s (*)",
^~~~~~~~
sound/soc/soc-pcm.c:2833:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(new_name, sizeof(new_name), "%s (*)",
^~~~~~~~
sound/soc/soc-pcm.c:2836:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(new_name, sizeof(new_name), "%s %s-%d",
^~~~~~~~
sound/soc/soc-pcm.c:2836:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(new_name, sizeof(new_name), "%s %s-%d",
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
sound/soc/codecs/rt1308-sdw.c:212:2: warning: Value stored to 'efuse_m_btl_l' is never read [clang-analyzer-deadcode.DeadStores]
efuse_m_btl_l = efuse_m_btl_l | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:212:2: note: Value stored to 'efuse_m_btl_l' is never read
efuse_m_btl_l = efuse_m_btl_l | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:216:2: warning: Value stored to 'efuse_c_btl_l' is never read [clang-analyzer-deadcode.DeadStores]
efuse_c_btl_l = efuse_c_btl_l | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:216:2: note: Value stored to 'efuse_c_btl_l' is never read
efuse_c_btl_l = efuse_c_btl_l | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:220:2: warning: Value stored to 'efuse_m_btl_r' is never read [clang-analyzer-deadcode.DeadStores]
efuse_m_btl_r = efuse_m_btl_r | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:220:2: note: Value stored to 'efuse_m_btl_r' is never read
efuse_m_btl_r = efuse_m_btl_r | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:224:2: warning: Value stored to 'efuse_c_btl_r' is never read [clang-analyzer-deadcode.DeadStores]
efuse_c_btl_r = efuse_c_btl_r | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt1308-sdw.c:224:2: note: Value stored to 'efuse_c_btl_r' is never read
efuse_c_btl_r = efuse_c_btl_r | (tmp << 8);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
>> sound/soc/codecs/rt1308-sdw.c:303:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rt1308->params, params, sizeof(*params));
^~~~~~
sound/soc/codecs/rt1308-sdw.c:303:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rt1308->params, params, sizeof(*params));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/mmc/core/sdio_cis.c:63:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(string, buf);
^~~~~~
drivers/mmc/core/sdio_cis.c:63:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(string, buf);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/mmc/core/regulator.c:181:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = mmc_dev(mmc);
^~~
drivers/mmc/core/regulator.c:181:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = mmc_dev(mmc);
^~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/mmc/core/block.c:235:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(buf, PAGE_SIZE, "%d\n", locked);
^~~~~~~~
drivers/mmc/core/block.c:235:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(buf, PAGE_SIZE, "%d\n", locked);
^~~~~~~~
drivers/mmc/core/block.c:296:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(buf, PAGE_SIZE, "%d\n",
^~~~~~~~
drivers/mmc/core/block.c:296:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(buf, PAGE_SIZE, "%d\n",
^~~~~~~~
drivers/mmc/core/block.c:560:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&idata->ic.response, cmd.resp, sizeof(cmd.resp));
^~~~~~
drivers/mmc/core/block.c:560:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&idata->ic.response, cmd.resp, sizeof(cmd.resp));
^~~~~~
drivers/mmc/core/block.c:924:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/block.c:924:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(struct mmc_command));
^~~~~~
drivers/mmc/core/block.c:1305:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(brq, 0, sizeof(struct mmc_blk_request));
^~~~~~
drivers/mmc/core/block.c:1305:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(brq, 0, sizeof(struct mmc_blk_request));
^~~~~~
drivers/mmc/core/block.c:1522:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(brq, 0, sizeof(*brq));
^~~~~~
drivers/mmc/core/block.c:1522:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(brq, 0, sizeof(*brq));
^~~~~~
drivers/mmc/core/block.c:2419:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(md->disk->disk_name, sizeof(md->disk->disk_name),
^~~~~~~~
drivers/mmc/core/block.c:2419:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(md->disk->disk_name, sizeof(md->disk->disk_name),
^~~~~~~~
drivers/mmc/core/block.c:2612:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(rpmb_name, sizeof(rpmb_name),
^~~~~~~~
drivers/mmc/core/block.c:2612:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(rpmb_name, sizeof(rpmb_name),
^~~~~~~~
drivers/mmc/core/block.c:2794:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n += sprintf(buf + n, "%02x", ext_csd[i]);
^~~~~~~
drivers/mmc/core/block.c:2794:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
n += sprintf(buf + n, "%02x", ext_csd[i]);
--
ret = coresight_validate_source(csdev, __func__);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1075:6: note: Assuming 'type' is equal to CORESIGHT_DEV_TYPE_SOURCE
if (type != CORESIGHT_DEV_TYPE_SOURCE) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1075:2: note: Taking false branch
if (type != CORESIGHT_DEV_TYPE_SOURCE) {
^
drivers/hwtracing/coresight/coresight-core.c:1080:6: note: Assuming 'subtype' is not equal to CORESIGHT_DEV_SUBTYPE_SOURCE_PROC
if (subtype != CORESIGHT_DEV_SUBTYPE_SOURCE_PROC &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1080:6: note: Left side of '&&' is true
drivers/hwtracing/coresight/coresight-core.c:1081:6: note: Assuming 'subtype' is equal to CORESIGHT_DEV_SUBTYPE_SOURCE_SOFTWARE
subtype != CORESIGHT_DEV_SUBTYPE_SOURCE_SOFTWARE) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1080:2: note: Taking false branch
if (subtype != CORESIGHT_DEV_SUBTYPE_SOURCE_PROC &&
^
drivers/hwtracing/coresight/coresight-core.c:1086:2: note: Returning without writing to 'csdev->enable', which participates in a condition later
return 0;
^
drivers/hwtracing/coresight/coresight-core.c:1086:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1176:8: note: Returning from 'coresight_validate_source'
ret = coresight_validate_source(csdev, __func__);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1177:6: note: 'ret' is 0
if (ret)
^~~
drivers/hwtracing/coresight/coresight-core.c:1177:2: note: Taking false branch
if (ret)
^
drivers/hwtracing/coresight/coresight-core.c:1180:6: note: Assuming field 'enable' is true
if (!csdev->enable || !coresight_disable_source(csdev))
^~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1180:6: note: Left side of '||' is false
drivers/hwtracing/coresight/coresight-core.c:1180:25: note: Calling 'coresight_disable_source'
if (!csdev->enable || !coresight_disable_source(csdev))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:469:6: note: Assuming the condition is true
if (atomic_dec_return(csdev->refcnt) == 0) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:469:2: note: Taking true branch
if (atomic_dec_return(csdev->refcnt) == 0) {
^
drivers/hwtracing/coresight/coresight-core.c:470:18: note: Assuming field 'disable' is null
if (source_ops(csdev)->disable)
^
include/linux/coresight.h:279:27: note: expanded from macro 'source_ops'
#define source_ops(csdev) csdev->ops->source_ops
^
drivers/hwtracing/coresight/coresight-core.c:470:3: note: Taking false branch
if (source_ops(csdev)->disable)
^
drivers/hwtracing/coresight/coresight-core.c:475:2: note: Returning the value 1, which participates in a condition later
return !csdev->enable;
^~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1180:25: note: Returning from 'coresight_disable_source'
if (!csdev->enable || !coresight_disable_source(csdev))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1180:2: note: Taking false branch
if (!csdev->enable || !coresight_disable_source(csdev))
^
drivers/hwtracing/coresight/coresight-core.c:1183:2: note: Control jumps to the 'default' case at line 1193
switch (csdev->subtype.source_subtype) {
^
drivers/hwtracing/coresight/coresight-core.c:1195:3: note: Execution continues on line 1198
break;
^
drivers/hwtracing/coresight/coresight-core.c:1199:25: note: Passing null pointer value via 1st parameter 'path'
coresight_release_path(path);
^~~~
drivers/hwtracing/coresight/coresight-core.c:1199:2: note: Calling 'coresight_release_path'
coresight_release_path(path);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:881:2: note: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'path')
list_for_each_entry_safe(nd, next, path, link) {
^
include/linux/list.h:725:13: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^ ~~~~
include/linux/list.h:531:2: note: expanded from macro 'list_first_entry'
list_entry((ptr)->next, type, member)
^ ~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^ ~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~
drivers/hwtracing/coresight/coresight-core.c:1737:4: warning: Value stored to 'idx' is never read [clang-analyzer-deadcode.DeadStores]
idx = -ENOMEM;
^ ~~~~~~~
drivers/hwtracing/coresight/coresight-core.c:1737:4: note: Value stored to 'idx' is never read
idx = -ENOMEM;
^ ~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> sound/soc/generic/audio-graph-card.c:301:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
sound/soc/generic/audio-graph-card.c:301:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
sound/soc/generic/audio-graph-card.c:336:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
sound/soc/generic/audio-graph-card.c:336:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
sound/soc/generic/audio-graph-card.c:369:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = simple_priv_to_dev(priv);
^~~
sound/soc/generic/audio-graph-card.c:369:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = simple_priv_to_dev(priv);
^~~
sound/soc/generic/audio-graph-card.c:387:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
sound/soc/generic/audio-graph-card.c:387:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dai_name, sizeof(dai_name),
^~~~~~~~
>> sound/soc/generic/audio-graph-card.c:462:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&adata, 0, sizeof(adata));
^~~~~~
sound/soc/generic/audio-graph-card.c:462:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&adata, 0, sizeof(adata));
^~~~~~
sound/soc/generic/audio-graph-card.c:571:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(li, 0, sizeof(*li));
^~~~~~
sound/soc/generic/audio-graph-card.c:571:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(li, 0, sizeof(*li));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/v4l2-core/v4l2-device.c:37:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name), "%s %s",
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:37:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name), "%s %s",
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:67:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:67:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:70:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:70:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (31 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/scsi/libsas/sas_ata.c:123:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->sata_dev.fis, resp->ending_fis, ATA_RESP_FIS_SIZE);
^~~~~~
drivers/scsi/libsas/sas_ata.c:123:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->sata_dev.fis, resp->ending_fis, ATA_RESP_FIS_SIZE);
^~~~~~
drivers/scsi/libsas/sas_ata.c:196:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(task->ata_task.atapi_packet, qc->cdb, qc->dev->cdb_len);
^~~~~~
drivers/scsi/libsas/sas_ata.c:196:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(task->ata_task.atapi_packet, qc->cdb, qc->dev->cdb_len);
^~~~~~
drivers/scsi/libsas/sas_ata.c:273:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->frame_rcvd, &dev->sata_dev.rps_resp.rps.fis,
^~~~~~
drivers/scsi/libsas/sas_ata.c:273:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->frame_rcvd, &dev->sata_dev.rps_resp.rps.fis,
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/md/persistent-data/dm-btree-spine.c:251:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&v1_le, value1_le, sizeof(v1_le));
^~~~~~
drivers/md/persistent-data/dm-btree-spine.c:251:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&v1_le, value1_le, sizeof(v1_le));
^~~~~~
drivers/md/persistent-data/dm-btree-spine.c:252:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&v2_le, value2_le, sizeof(v2_le));
^~~~~~
drivers/md/persistent-data/dm-btree-spine.c:252:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&v2_le, value2_le, sizeof(v2_le));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/md/dm-raid1.c:943:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &offset, &dummy) != 1 ||
^~~~~~
drivers/md/dm-raid1.c:943:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &offset, &dummy) != 1 ||
^~~~~~
drivers/md/dm-raid1.c:980:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%u%c", ¶m_count, &dummy) != 1) {
^~~~~~
drivers/md/dm-raid1.c:980:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%u%c", ¶m_count, &dummy) != 1) {
^~~~~~
drivers/md/dm-raid1.c:1015:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[0], "%u%c", &num_features, &dummy) != 1) {
^~~~~~
drivers/md/dm-raid1.c:1015:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[0], "%u%c", &num_features, &dummy) != 1) {
^~~~~~
drivers/md/dm-raid1.c:1078:15: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!argc || sscanf(argv[0], "%u%c", &nr_mirrors, &dummy) != 1 ||
^~~~~~
drivers/md/dm-raid1.c:1078:15: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!argc || sscanf(argv[0], "%u%c", &nr_mirrors, &dummy) != 1 ||
^~~~~~
drivers/md/dm-raid1.c:1135:2: warning: Value stored to 'argv' is never read [clang-analyzer-deadcode.DeadStores]
argv += args_used;
^ ~~~~~~~~~
drivers/md/dm-raid1.c:1135:2: note: Value stored to 'argv' is never read
argv += args_used;
^ ~~~~~~~~~
drivers/md/dm-raid1.c:1415:3: warning: Value stored to 'sz' is never read [clang-analyzer-deadcode.DeadStores]
sz += log->type->status(log, type, result+sz, maxlen-sz);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-raid1.c:1415:3: note: Value stored to 'sz' is never read
sz += log->type->status(log, type, result+sz, maxlen-sz);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/bio.h:567:6: warning: Access to field 'tail' results in a dereference of a null pointer (loaded from variable 'bl') [clang-analyzer-core.NullDereference]
if (bl->tail)
^
drivers/md/dm-raid1.c:857:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&ms->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/md/dm-raid1.c:857:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&ms->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/md/dm-raid1.c:869:2: note: Calling 'do_writes'
do_writes(ms, &writes);
^~~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-raid1.c:683:42: note: 'this_list' initialized to a null pointer value
struct bio_list sync, nosync, recover, *this_list = NULL;
^~~~~~~~~
drivers/md/dm-raid1.c:688:6: note: Assuming field 'head' is non-null
if (!writes->head)
^~~~~~~~~~~~~
drivers/md/dm-raid1.c:688:2: note: Taking false branch
if (!writes->head)
^
drivers/md/dm-raid1.c:699:2: note: Loop condition is true. Entering loop body
while ((bio = bio_list_pop(writes))) {
^
drivers/md/dm-raid1.c:700:8: note: Assuming the condition is false
if ((bio->bi_opf & REQ_PREFLUSH) ||
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-raid1.c:700:7: note: Left side of '||' is false
if ((bio->bi_opf & REQ_PREFLUSH) ||
^
drivers/md/dm-raid1.c:701:8: note: Assuming the condition is false
(bio_op(bio) == REQ_OP_DISCARD)) {
^
include/linux/blk_types.h:455:2: note: expanded from macro 'bio_op'
((bio)->bi_opf & REQ_OP_MASK)
^
drivers/md/dm-raid1.c:700:3: note: Taking false branch
if ((bio->bi_opf & REQ_PREFLUSH) ||
^
drivers/md/dm-raid1.c:708:7: note: Assuming field 'is_remote_recovering' is null
if (log->type->is_remote_recovering &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-raid1.c:708:39: note: Left side of '&&' is false
if (log->type->is_remote_recovering &&
^
drivers/md/dm-raid1.c:715:3: note: 'Default' branch taken. Execution continues on line 730
switch (state) {
^
drivers/md/dm-raid1.c:730:16: note: Passing null pointer value via 1st parameter 'bl'
bio_list_add(this_list, bio);
^~~~~~~~~
drivers/md/dm-raid1.c:730:3: note: Calling 'bio_list_add'
bio_list_add(this_list, bio);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/bio.h:567:6: note: Access to field 'tail' results in a dereference of a null pointer (loaded from variable 'bl')
if (bl->tail)
^~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
>> drivers/hwtracing/coresight/coresight-etm-perf.c:55:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(cycacc, "config:" __stringify(ETM_OPT_CYCACC));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:55:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(cycacc, "config:" __stringify(ETM_OPT_CYCACC));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:57:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(contextid1, "config:" __stringify(ETM_OPT_CTXTID));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:57:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(contextid1, "config:" __stringify(ETM_OPT_CTXTID));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:59:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(contextid2, "config:" __stringify(ETM_OPT_CTXTID2));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:59:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(contextid2, "config:" __stringify(ETM_OPT_CTXTID2));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:60:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(timestamp, "config:" __stringify(ETM_OPT_TS));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:60:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(timestamp, "config:" __stringify(ETM_OPT_TS));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:61:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(retstack, "config:" __stringify(ETM_OPT_RETSTK));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:61:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(retstack, "config:" __stringify(ETM_OPT_RETSTK));
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:63:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(preset, "config:0-3");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:63:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(preset, "config:0-3");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:65:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(sinkid, "config2:0-31");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:65:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(sinkid, "config2:0-31");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:67:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(configid, "config2:32-63");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:67:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(configid, "config2:32-63");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:84:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "config:%d\n", pid_fmt);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:84:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "config:%d\n", pid_fmt);
^~~~~~~
>> drivers/hwtracing/coresight/coresight-etm-perf.c:157:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(filters, event->parent->hw.addr_filters,
^~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:157:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(filters, event->parent->hw.addr_filters,
^~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:701:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(entry, "cpu%d", cpu);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm-perf.c:701:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(entry, "cpu%d", cpu);
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/soundwire/sysfs_slave_dpn.c:98:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(imp_def_interrupts);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:98:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(imp_def_interrupts);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:99:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(max_word);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:99:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(max_word);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:100:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(min_word);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:100:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(min_word);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:101:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(type);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:101:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(type);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:102:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(max_grouping);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:102:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(max_grouping);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:103:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(simple_ch_prep_sm);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:103:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(simple_ch_prep_sm);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:104:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(ch_prep_timeout);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:104:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdw_dpn_attr(ch_prep_timeout);
^
drivers/soundwire/sysfs_slave_dpn.c:75:11: note: expanded from macro 'sdw_dpn_attr'
return sprintf(buf, format_string, \
^~~~~~~
drivers/soundwire/sysfs_slave_dpn.c:105:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdw_dpn_attr(max_ch);
--
^~~~~~~~~~~~~
lib/vsprintf.c:1342:3: note: Taking false branch
if (leading_zeros) {
^
lib/vsprintf.c:1349:10: note: The value 1 is assigned to 'digits'
while (digits--)
^~~~~~~~
lib/vsprintf.c:1349:3: note: Loop condition is true. Entering loop body
while (digits--)
^
lib/vsprintf.c:1350:9: note: Assigned value is garbage or undefined
*p++ = temp[digits];
^ ~~~~~~~~~~~~
lib/vsprintf.c:1373:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&in6, addr, sizeof(struct in6_addr));
^~~~~~
lib/vsprintf.c:1373:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&in6, addr, sizeof(struct in6_addr));
^~~~~~
lib/vsprintf.c:1377:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(zerolength, 0, sizeof(zerolength));
^~~~~~
lib/vsprintf.c:1377:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(zerolength, 0, sizeof(zerolength));
^~~~~~
lib/vsprintf.c:1413:4: warning: Value stored to 'needcolon' is never read [clang-analyzer-deadcode.DeadStores]
needcolon = false;
^ ~~~~~
lib/vsprintf.c:1413:4: note: Value stored to 'needcolon' is never read
needcolon = false;
^ ~~~~~
lib/vsprintf.c:1684:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += vsnprintf(buf, end > buf ? end - buf : 0, va_fmt->fmt, va);
^~~~~~~~~
lib/vsprintf.c:1684:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
buf += vsnprintf(buf, end > buf ? end - buf : 0, va_fmt->fmt, va);
^~~~~~~~~
lib/vsprintf.c:1781:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(p, *fourcc & BIT(31) ? " big-endian" : " little-endian");
^~~~~~
lib/vsprintf.c:1781:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(p, *fourcc & BIT(31) ? " big-endian" : " little-endian");
^~~~~~
lib/vsprintf.c:2757:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(str, old_fmt, copy);
^~~~~~
lib/vsprintf.c:2757:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(str, old_fmt, copy);
^~~~~~
lib/vsprintf.c:2898:6: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsnprintf(buf, size, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2898:6: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
i = vsnprintf(buf, size, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2928:6: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsnprintf(buf, size, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2928:6: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
i = vsnprintf(buf, size, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2975:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return vsnprintf(buf, INT_MAX, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2975:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
return vsnprintf(buf, INT_MAX, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2997:6: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsnprintf(buf, INT_MAX, fmt, args);
^~~~~~~~~
lib/vsprintf.c:2997:6: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
i = vsnprintf(buf, INT_MAX, fmt, args);
^~~~~~~~~
lib/vsprintf.c:3096:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(str, save_str, len);
^~~~~~
lib/vsprintf.c:3096:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(str, save_str, len);
^~~~~~
lib/vsprintf.c:3232:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(str, old_fmt, copy);
^~~~~~
lib/vsprintf.c:3232:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(str, old_fmt, copy);
^~~~~~
lib/vsprintf.c:3297:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(str, args, copy);
^~~~~~
lib/vsprintf.c:3297:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(str, args, copy);
^~~~~~
lib/vsprintf.c:3692:6: warning: Call to function 'vsscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsscanf(buf, fmt, args);
^~~~~~~
lib/vsprintf.c:3692:6: note: Call to function 'vsscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsscanf_s' in case of C11
i = vsscanf(buf, fmt, args);
^~~~~~~
Suppressed 83 warnings (82 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/hwtracing/coresight/coresight-tmc-etf.c:62:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufp, &read_data, 4);
^~~~~~
drivers/hwtracing/coresight/coresight-tmc-etf.c:62:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bufp, &read_data, 4);
^~~~~~
>> drivers/hwtracing/coresight/coresight-tmc-etf.c:201:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvdata->buf, 0, drvdata->size);
^~~~~~
drivers/hwtracing/coresight/coresight-tmc-etf.c:201:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvdata->buf, 0, drvdata->size);
^~~~~~
drivers/hwtracing/coresight/coresight-tmc-etf.c:666:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvdata->buf, 0, drvdata->size);
^~~~~~
drivers/hwtracing/coresight/coresight-tmc-etf.c:666:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvdata->buf, 0, drvdata->size);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/hwtracing/coresight/coresight-tmc-etr.c:918:2: warning: Called function pointer is null (null dereference) [clang-analyzer-core.CallAndMessage]
etr_buf->ops->free(etr_buf);
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:1425:6: note: Assuming 'etr_buf' is non-null
if (!etr_buf)
^~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:1425:2: note: Taking false branch
if (!etr_buf)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:1430:2: note: Taking false branch
if (!refcount_dec_and_test(&etr_buf->refcount)) {
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:1443:6: note: Assuming 'buf' is null
if (buf && WARN_ON(buf != etr_buf))
^~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:1443:10: note: Left side of '&&' is false
if (buf && WARN_ON(buf != etr_buf))
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:1446:2: note: Calling 'tmc_free_etr_buf'
tmc_free_etr_buf(etr_perf->etr_buf);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:10: note: Assuming field 'ops' is non-null
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:10: note: Left side of '||' is false
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:27: note: Assuming field 'free' is null
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:2: note: Taking true branch
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:90:3: note: expanded from macro '__WARN_printf'
instrumentation_begin(); \
^
include/linux/instrumentation.h:57:34: note: expanded from macro 'instrumentation_begin'
# define instrumentation_begin() do { } while(0)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:92:3: note: expanded from macro '__WARN_printf'
instrumentation_end(); \
^
include/linux/instrumentation.h:58:33: note: expanded from macro 'instrumentation_end'
# define instrumentation_end() do { } while(0)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:917:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->free);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:89:38: note: expanded from macro '__WARN_printf'
#define __WARN_printf(taint, arg...) do { \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:918:2: note: Called function pointer is null (null dereference)
etr_buf->ops->free(etr_buf);
--
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/once_lite.h:17:16: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:971:6: note: Left side of '&&' is false
if (WARN_ON_ONCE(status & TMC_STS_MEMERR)) {
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:30: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:971:6: note: Taking false branch
if (WARN_ON_ONCE(status & TMC_STS_MEMERR)) {
^
include/asm-generic/bug.h:146:2: note: expanded from macro 'WARN_ON_ONCE'
DO_ONCE_LITE_IF(condition, WARN_ON, 1)
^
include/linux/once_lite.h:17:3: note: expanded from macro 'DO_ONCE_LITE_IF'
if (unlikely(__ret_do_once && !__already_done)) { \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:971:2: note: Taking false branch
if (WARN_ON_ONCE(status & TMC_STS_MEMERR)) {
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:979:19: note: Assuming the condition is false
etr_buf->full = !!(status & TMC_STS_FULL);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:10: note: Assuming field 'ops' is non-null
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:10: note: Left side of '||' is false
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:27: note: Assuming field 'sync' is null
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:2: note: Taking true branch
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
if (unlikely(__ret_warn_on)) \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:90:3: note: expanded from macro '__WARN_printf'
instrumentation_begin(); \
^
include/linux/instrumentation.h:57:34: note: expanded from macro 'instrumentation_begin'
# define instrumentation_begin() do { } while(0)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:92:3: note: expanded from macro '__WARN_printf'
instrumentation_end(); \
^
include/linux/instrumentation.h:58:33: note: expanded from macro 'instrumentation_end'
# define instrumentation_end() do { } while(0)
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:981:2: note: Loop condition is false. Exiting loop
WARN_ON(!etr_buf->ops || !etr_buf->ops->sync);
^
include/asm-generic/bug.h:123:3: note: expanded from macro 'WARN_ON'
__WARN(); \
^
include/asm-generic/bug.h:88:19: note: expanded from macro '__WARN'
#define __WARN() __WARN_printf(TAINT_WARN, NULL)
^
include/asm-generic/bug.h:89:38: note: expanded from macro '__WARN_printf'
#define __WARN_printf(taint, arg...) do { \
^
drivers/hwtracing/coresight/coresight-tmc-etr.c:983:2: note: Called function pointer is null (null dereference)
etr_buf->ops->sync(etr_buf, rrp, rwp);
^~~~~~~~~~~~~~~~~~
>> drivers/hwtracing/coresight/coresight-tmc-etr.c:1488:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_pages[pg_idx] + pg_offset, src_buf, bytes);
^~~~~~
drivers/hwtracing/coresight/coresight-tmc-etr.c:1488:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_pages[pg_idx] + pg_offset, src_buf, bytes);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/hwtracing/intel_th/gth.c:157:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%x\n", port);
^~~~~~~~
drivers/hwtracing/intel_th/gth.c:157:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%x\n", port);
^~~~~~~~
drivers/hwtracing/intel_th/gth.c:159:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "disabled\n");
^~~~~~~~
drivers/hwtracing/intel_th/gth.c:159:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "disabled\n");
^~~~~~~~
drivers/hwtracing/intel_th/gth.c:335:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%x\n",
^~~~~~~~
drivers/hwtracing/intel_th/gth.c:335:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%x\n",
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
sound/soc/xtensa/xtfpga-i2s.c:285:11: warning: Value stored to 'channels' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned channels = params_channels(params);
^~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/xtensa/xtfpga-i2s.c:285:11: note: Value stored to 'channels' during its initialization is never read
unsigned channels = params_channels(params);
^~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (16 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/remoteproc/remoteproc_virtio.c:111:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, size);
^~~~~~
drivers/remoteproc/remoteproc_virtio.c:111:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, size);
^~~~~~
drivers/remoteproc/remoteproc_virtio.c:278:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, cfg + offset, len);
^~~~~~
drivers/remoteproc/remoteproc_virtio.c:278:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, cfg + offset, len);
^~~~~~
drivers/remoteproc/remoteproc_virtio.c:296:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg + offset, buf, len);
^~~~~~
drivers/remoteproc/remoteproc_virtio.c:296:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg + offset, buf, len);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/md/dm-dust.c:358:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1 || tmp != (sector_t)tmp) {
^~~~~~
drivers/md/dm-dust.c:358:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1 || tmp != (sector_t)tmp) {
^~~~~~
drivers/md/dm-dust.c:461:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:461:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:481:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:481:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
--
drivers/rpmsg/rpmsg_core.c:525:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(chinfo.name, rpdev->id.name, RPMSG_NAME_SIZE);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/cs42l42.c:605:8: warning: Excessive padding in 'struct cs42l42_pll_params' (5 padding bytes, where 1 is optimal).
Optimal fields order:
sclk,
pll_div_frac,
mclk_int,
mclk_src_sel,
sclk_prediv,
pll_div_int,
pll_mode,
pll_divout,
pll_cal_ratio,
n,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct cs42l42_pll_params {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs42l42.c:605:8: note: Excessive padding in 'struct cs42l42_pll_params' (5 padding bytes, where 1 is optimal). Optimal fields order: sclk, pll_div_frac, mclk_int, mclk_src_sel, sclk_prediv, pll_div_int, pll_mode, pll_divout, pll_cal_ratio, n, consider reordering the fields or adding explicit padding members
struct cs42l42_pll_params {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
sound/soc/codecs/cs43130.c:180:8: warning: Excessive padding in 'struct cs43130_pll_params' (7 padding bytes, where 3 is optimal).
Optimal fields order:
pll_in,
pll_div_frac,
pll_out,
sclk_prediv,
pll_div_int,
pll_mode,
pll_divout,
pll_cal_ratio,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct cs43130_pll_params {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs43130.c:180:8: note: Excessive padding in 'struct cs43130_pll_params' (7 padding bytes, where 3 is optimal). Optimal fields order: pll_in, pll_div_frac, pll_out, sclk_prediv, pll_div_int, pll_mode, pll_divout, pll_cal_ratio, consider reordering the fields or adding explicit padding members
struct cs43130_pll_params {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs43130.c:1938:28: warning: Value stored to 'component' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct snd_soc_component *component = cs43130->component;
^~~~~~~~~ ~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs43130.c:1938:28: note: Value stored to 'component' during its initialization is never read
struct snd_soc_component *component = cs43130->component;
^~~~~~~~~ ~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs43130.c:2532:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all_hp_widgets, digital_hp_widgets,
^~~~~~
sound/soc/codecs/cs43130.c:2532:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all_hp_widgets, digital_hp_widgets,
^~~~~~
sound/soc/codecs/cs43130.c:2534:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all_hp_widgets + ARRAY_SIZE(digital_hp_widgets),
^~~~~~
sound/soc/codecs/cs43130.c:2534:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all_hp_widgets + ARRAY_SIZE(digital_hp_widgets),
^~~~~~
sound/soc/codecs/cs43130.c:2536:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all_hp_routes, digital_hp_routes,
^~~~~~
sound/soc/codecs/cs43130.c:2536:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all_hp_routes, digital_hp_routes,
^~~~~~
sound/soc/codecs/cs43130.c:2538:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all_hp_routes + ARRAY_SIZE(digital_hp_routes),
^~~~~~
sound/soc/codecs/cs43130.c:2538:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all_hp_routes + ARRAY_SIZE(digital_hp_routes),
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/hwtracing/coresight/coresight-funnel.c:154:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:154:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:197:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#x\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:197:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#x\n", val);
^~~~~~~
include/linux/device.h:698:19: warning: Access to field 'driver_data' results in a dereference of a null pointer (loaded from variable 'dev') [clang-analyzer-core.NullDereference]
dev->driver_data = data;
^
drivers/hwtracing/coresight/coresight-funnel.c:373:22: note: Passing value via 1st parameter 'dev'
return funnel_probe(&adev->dev, &adev->res);
^~~~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:373:9: note: Calling 'funnel_probe'
return funnel_probe(&adev->dev, &adev->res);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:216:34: note: Left side of '&&' is false
if (is_of_node(dev_fwnode(dev)) &&
^
drivers/hwtracing/coresight/coresight-funnel.c:221:6: note: Assuming field 'name' is non-null
if (!desc.name)
^~~~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:221:2: note: Taking false branch
if (!desc.name)
^
drivers/hwtracing/coresight/coresight-funnel.c:225:6: note: Assuming 'drvdata' is non-null
if (!drvdata)
^~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:225:2: note: Taking false branch
if (!drvdata)
^
drivers/hwtracing/coresight/coresight-funnel.c:229:7: note: Calling 'IS_ERR'
if (!IS_ERR(drvdata->atclk)) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is true
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning the value 1, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:229:7: note: Returning from 'IS_ERR'
if (!IS_ERR(drvdata->atclk)) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-funnel.c:229:2: note: Taking false branch
if (!IS_ERR(drvdata->atclk)) {
^
drivers/hwtracing/coresight/coresight-funnel.c:239:6: note: Assuming 'res' is null
if (res) {
^~~
drivers/hwtracing/coresight/coresight-funnel.c:239:2: note: Taking false branch
if (res) {
^
drivers/hwtracing/coresight/coresight-funnel.c:250:18: note: Passing value via 1st parameter 'dev'
dev_set_drvdata(dev, drvdata);
^~~
drivers/hwtracing/coresight/coresight-funnel.c:250:2: note: Calling 'dev_set_drvdata'
dev_set_drvdata(dev, drvdata);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:698:19: note: Access to field 'driver_data' results in a dereference of a null pointer (loaded from variable 'dev')
dev->driver_data = data;
~~~ ^
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> sound/soc/codecs/max98390.c:770:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(filename, sizeof(filename),
^~~~~~~~
sound/soc/codecs/max98390.c:770:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(filename, sizeof(filename),
^~~~~~~~
>> sound/soc/codecs/max98390.c:773:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(filename, "dsm_param.bin");
^~~~~~~
sound/soc/codecs/max98390.c:773:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(filename, "dsm_param.bin");
^~~~~~~
sound/soc/codecs/max98390.c:776:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(filename, sizeof(filename), "%s",
^~~~~~~~
sound/soc/codecs/max98390.c:776:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(filename, sizeof(filename), "%s",
^~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (46 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/leds/led-triggers.c:86:7: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
i = vsnprintf(NULL, 0, fmt, args);
^~~~~~~~~
drivers/leds/led-triggers.c:86:7: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
i = vsnprintf(NULL, 0, fmt, args);
^~~~~~~~~
drivers/leds/led-triggers.c:279:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy((char *)trig->name, name);
^~~~~~
drivers/leds/led-triggers.c:279:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy((char *)trig->name, name);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/leds/leds-bd2802.c:437:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "on\n");
^~~~~~~
drivers/leds/leds-bd2802.c:437:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "on\n");
^~~~~~~
drivers/leds/leds-bd2802.c:439:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "off\n");
^~~~~~~
drivers/leds/leds-bd2802.c:439:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "off\n");
^~~~~~~
drivers/leds/leds-bd2802.c:508:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BD2802_CONTROL_ATTR(wave_pattern, "wave_pattern");
^
drivers/leds/leds-bd2802.c:479:8: note: expanded from macro 'BD2802_CONTROL_ATTR'
ret = sprintf(buf, "0x%02x\n", led->attr_name); \
^~~~~~~
drivers/leds/leds-bd2802.c:508:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BD2802_CONTROL_ATTR(wave_pattern, "wave_pattern");
^
drivers/leds/leds-bd2802.c:479:8: note: expanded from macro 'BD2802_CONTROL_ATTR'
ret = sprintf(buf, "0x%02x\n", led->attr_name); \
^~~~~~~
drivers/leds/leds-bd2802.c:509:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BD2802_CONTROL_ATTR(rgb_current, "rgb_current");
^
drivers/leds/leds-bd2802.c:479:8: note: expanded from macro 'BD2802_CONTROL_ATTR'
ret = sprintf(buf, "0x%02x\n", led->attr_name); \
^~~~~~~
drivers/leds/leds-bd2802.c:509:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
BD2802_CONTROL_ATTR(rgb_current, "rgb_current");
^
drivers/leds/leds-bd2802.c:479:8: note: expanded from macro 'BD2802_CONTROL_ATTR'
ret = sprintf(buf, "0x%02x\n", led->attr_name); \
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/iio/industrialio-event.c:542:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ev_int->group.attrs,
^~~~~~
drivers/iio/industrialio-event.c:542:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ev_int->group.attrs,
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
drivers/mtd/chips/cfi_cmdset_0001.c:1753:6: note: Taking false branch
if (map_word_bitsset(map, status, CMD(0x30))) {
^
include/linux/mtd/map.h:313:3: note: expanded from macro 'map_word_bitsset'
if ((val1).x[i] & (val2).x[i]) { \
^
drivers/mtd/chips/cfi_cmdset_0001.c:1753:6: note: Loop condition is false. Execution continues on line 1753
if (map_word_bitsset(map, status, CMD(0x30))) {
^
include/linux/mtd/map.h:312:2: note: expanded from macro 'map_word_bitsset'
for (i = 0; i < map_words(map); i++) { \
^
drivers/mtd/chips/cfi_cmdset_0001.c:1753:2: note: Taking false branch
if (map_word_bitsset(map, status, CMD(0x30))) {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1764:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/mtd/chips/cfi_cmdset_0001.c:1764:2: note: Taking false branch
if (ret) {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1781:6: note: Assuming 'word_gap' is not equal to 0
if (!word_gap) {
^~~~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1781:2: note: Taking false branch
if (!word_gap) {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1797:7: note: Assuming the condition is false
if (n > vec->iov_len - vec_seek)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1797:3: note: Taking false branch
if (n > vec->iov_len - vec_seek)
^
drivers/mtd/chips/cfi_cmdset_0001.c:1799:7: note: Assuming 'n' is <= 'len'
if (n > len)
^~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1799:3: note: Taking false branch
if (n > len)
^
drivers/mtd/chips/cfi_cmdset_0001.c:1802:7: note: Assuming 'word_gap' is not equal to 0
if (!word_gap && len < map_bankwidth(map))
^~~~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1802:17: note: Left side of '&&' is false
if (!word_gap && len < map_bankwidth(map))
^
drivers/mtd/chips/cfi_cmdset_0001.c:1811:7: note: Assuming 'len' is not equal to 0
if (!len || word_gap == map_bankwidth(map)) {
^~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1811:7: note: Left side of '||' is false
drivers/mtd/chips/cfi_cmdset_0001.c:1811:15: note: Assuming 'word_gap' is not equal to field 'bankwidth'
if (!len || word_gap == map_bankwidth(map)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1811:3: note: Taking false branch
if (!len || word_gap == map_bankwidth(map)) {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1818:7: note: Assuming 'vec_seek' is equal to field 'iov_len'
if (vec_seek == vec->iov_len) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/chips/cfi_cmdset_0001.c:1818:3: note: Taking true branch
if (vec_seek == vec->iov_len) {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1795:2: note: Loop condition is true. Execution continues on line 1796
do {
^
drivers/mtd/chips/cfi_cmdset_0001.c:1797:24: note: The left operand of '-' is a garbage value
if (n > vec->iov_len - vec_seek)
~~~~~~~~~~~~ ^
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/v4l2-core/v4l2-fwnode.c:546:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(link, 0, sizeof(*link));
^~~~~~
drivers/media/v4l2-core/v4l2-fwnode.c:546:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(link, 0, sizeof(*link));
^~~~~~
drivers/media/v4l2-core/v4l2-fwnode.c:660:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(connector, 0, sizeof(*connector));
^~~~~~
drivers/media/v4l2-core/v4l2-fwnode.c:660:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(connector, 0, sizeof(*connector));
^~~~~~
drivers/media/v4l2-core/v4l2-fwnode.c:747:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(props, 0, sizeof(*props));
^~~~~~
drivers/media/v4l2-core/v4l2-fwnode.c:747:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(props, 0, sizeof(*props));
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/v4l2-core/v4l2-async.c:447:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev =
^~~
drivers/media/v4l2-core/v4l2-async.c:447:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev =
^~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> sound/soc/codecs/rt5682-sdw.c:669:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rt5682->params, params, sizeof(*params));
^~~~~~
sound/soc/codecs/rt5682-sdw.c:669:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rt5682->params, params, sizeof(*params));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
sound/soc/codecs/rt711.c:95:2: warning: Value stored to 'dev' is never read [clang-analyzer-deadcode.DeadStores]
dev = regmap_get_device(regmap);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/rt711.c:95:2: note: Value stored to 'dev' is never read
dev = regmap_get_device(regmap);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
sound/soc/codecs/rt711-sdw.c:409:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&rt711->params, params, sizeof(*params));
^~~~~~
sound/soc/codecs/rt711-sdw.c:409:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&rt711->params, params, sizeof(*params));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
sound/soc/codecs/sigmadsp.c:146:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctrl->cache, data, ctrl->num_bytes);
^~~~~~
sound/soc/codecs/sigmadsp.c:146:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctrl->cache, data, ctrl->num_bytes);
^~~~~~
sound/soc/codecs/sigmadsp.c:173:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ucontrol->value.bytes.data, ctrl->cache,
^~~~~~
sound/soc/codecs/sigmadsp.c:173:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ucontrol->value.bytes.data, ctrl->cache,
^~~~~~
sound/soc/codecs/sigmadsp.c:235:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, ctrl_chunk->name, name_len);
^~~~~~
sound/soc/codecs/sigmadsp.c:235:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, ctrl_chunk->name, name_len);
^~~~~~
sound/soc/codecs/sigmadsp.c:282:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data->data, data_chunk->data, length);
^~~~~~
sound/soc/codecs/sigmadsp.c:282:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data->data, data_chunk->data, length);
^~~~~~
sound/soc/codecs/sigmadsp.c:424:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data->data, sa->payload, data->length);
^~~~~~
sound/soc/codecs/sigmadsp.c:424:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data->data, sa->payload, data->length);
^~~~~~
sound/soc/codecs/sigmadsp.c:649:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&template, 0, sizeof(template));
^~~~~~
sound/soc/codecs/sigmadsp.c:649:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&template, 0, sizeof(template));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
drivers/nvme/host/core.c:629:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nvme_req(req)->cmd, cmd, sizeof(*cmd));
^~~~~~
drivers/nvme/host/core.c:629:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nvme_req(req)->cmd, cmd, sizeof(*cmd));
^~~~~~
drivers/nvme/host/core.c:746:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(s, 0, sizeof(*s));
^~~~~~
drivers/nvme/host/core.c:746:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(s, 0, sizeof(*s));
^~~~~~
drivers/nvme/host/core.c:819:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:819:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:871:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:871:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:888:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:888:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmnd, 0, sizeof(*cmnd));
^~~~~~
drivers/nvme/host/core.c:1365:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ids->eui64, data + sizeof(*cur), NVME_NIDT_EUI64_LEN);
--
sound/soc/codecs/adau1701.c:748:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
sound/soc/codecs/adau1701.c:748:2: note: Taking false branch
if (ret < 0) {
^
sound/soc/codecs/adau1701.c:753:9: note: Calling 'adau1701_reset'
return adau1701_reset(component, adau1701->pll_clkdiv, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/adau1701.c:309:6: note: Assuming the condition is true
if (clkdiv != ADAU1707_CLKDIV_UNSET && adau1701->gpio_pll_mode) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/adau1701.c:309:6: note: Left side of '&&' is true
sound/soc/codecs/adau1701.c:309:41: note: Assuming field 'gpio_pll_mode' is non-null
if (clkdiv != ADAU1707_CLKDIV_UNSET && adau1701->gpio_pll_mode) {
^~~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/adau1701.c:309:2: note: Taking true branch
if (clkdiv != ADAU1707_CLKDIV_UNSET && adau1701->gpio_pll_mode) {
^
sound/soc/codecs/adau1701.c:310:3: note: Control jumps to 'case 256:' at line 315
switch (clkdiv) {
^
sound/soc/codecs/adau1701.c:316:4: note: Calling '__assign_bit'
__assign_bit(0, values, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:217:6: note: 'value' is false
if (value)
^~~~~
include/linux/bitops.h:217:2: note: Taking false branch
if (value)
^
include/linux/bitops.h:220:3: note: Calling 'arch___clear_bit'
__clear_bit(nr, addr);
^
include/asm-generic/bitops/non-atomic.h:34:21: note: expanded from macro '__clear_bit'
#define __clear_bit arch___clear_bit
^
include/asm-generic/bitops/non-atomic.h:32:5: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
*p &= ~mask;
~~ ^
sound/soc/codecs/adau1701.c:276:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 3, bytes + i * 4, 4);
^~~~~~
sound/soc/codecs/adau1701.c:276:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 3, bytes + i * 4, 4);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
sound/soc/codecs/wm8741.c:561:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&wm8741->pdata, pdata, sizeof(wm8741->pdata));
^~~~~~
sound/soc/codecs/wm8741.c:561:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&wm8741->pdata, pdata, sizeof(wm8741->pdata));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/wm8903.c:434:3: warning: Value stored to 'best' is never read [clang-analyzer-deadcode.DeadStores]
best = 0;
^ ~
sound/soc/codecs/wm8903.c:434:3: note: Value stored to 'best' is never read
best = 0;
^ ~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/soundwire/debugfs.c:22:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "master-%d-%d", bus->id, bus->link_id);
^~~~~~~~
drivers/soundwire/debugfs.c:22:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "master-%d-%d", bus->id, bus->link_id);
^~~~~~~~
drivers/soundwire/debugfs.c:130:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "%s", dev_name(&slave->dev));
^~~~~~~~
drivers/soundwire/debugfs.c:130:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "%s", dev_name(&slave->dev));
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/soundwire/qcom.c:1160:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bp_mode, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1160:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bp_mode, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1165:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hstart, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1165:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hstart, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1168:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hstop, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1168:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hstop, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1171:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(word_length, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1171:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(word_length, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1174:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(blk_group_count, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1174:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(blk_group_count, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1177:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(lane_control, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
drivers/soundwire/qcom.c:1177:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(lane_control, SWR_INVALID_PARAM, QCOM_SDW_MAX_PORTS);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/md/dm-clone-metadata.c:304:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sb->uuid, 0, sizeof(sb->uuid));
^~~~~~
drivers/md/dm-clone-metadata.c:304:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sb->uuid, 0, sizeof(sb->uuid));
^~~~~~
drivers/md/dm-clone-metadata.c:310:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sb->metadata_space_map_root, &cmd->metadata_space_map_root,
^~~~~~
drivers/md/dm-clone-metadata.c:310:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sb->metadata_space_map_root, &cmd->metadata_space_map_root,
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
85 warnings generated.
drivers/md/dm-integrity.c:679:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
clear_page(data);
^
arch/arm/include/asm/page-nommu.h:11:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((page), 0, PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:679:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
clear_page(data);
^
arch/arm/include/asm/page-nommu.h:11:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((page), 0, PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:712:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
copy_page(dst_data, src_data);
^
arch/arm/include/asm/page-nommu.h:12:28: note: expanded from macro 'copy_page'
#define copy_page(to,from) memcpy((to), (from), PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:712:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
copy_page(dst_data, src_data);
^
arch/arm/include/asm/page-nommu.h:12:28: note: expanded from macro 'copy_page'
#define copy_page(to,from) memcpy((to), (from), PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:847:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(result + size, 0, JOURNAL_MAC_SIZE - size);
^~~~~~
drivers/md/dm-integrity.c:847:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(result + size, 0, JOURNAL_MAC_SIZE - size);
^~~~~~
drivers/md/dm-integrity.c:860:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(result, digest, JOURNAL_MAC_SIZE);
^~~~~~
drivers/md/dm-integrity.c:860:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(result, digest, JOURNAL_MAC_SIZE);
^~~~~~
drivers/md/dm-integrity.c:865:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(result, 0, JOURNAL_MAC_SIZE);
^~~~~~
drivers/md/dm-integrity.c:865:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(result, 0, JOURNAL_MAC_SIZE);
^~~~~~
drivers/md/dm-integrity.c:882:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&js->mac, result + (j * JOURNAL_MAC_PER_SECTOR), JOURNAL_MAC_PER_SECTOR);
^~~~~~
drivers/md/dm-integrity.c:882:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&js->mac, result + (j * JOURNAL_MAC_PER_SECTOR), JOURNAL_MAC_PER_SECTOR);
--
^~~~~~
drivers/md/dm-integrity.c:3798:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
clear_page(va);
^
arch/arm/include/asm/page-nommu.h:11:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((page), 0, PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:3798:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
clear_page(va);
^
arch/arm/include/asm/page-nommu.h:11:26: note: expanded from macro 'clear_page'
#define clear_page(page) memset((page), 0, PAGE_SIZE)
^~~~~~
drivers/md/dm-integrity.c:3868:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_iv, 0x00, ivsize);
^~~~~~
drivers/md/dm-integrity.c:3868:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_iv, 0x00, ivsize);
^~~~~~
drivers/md/dm-integrity.c:3869:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_data, 0x00, crypt_len);
^~~~~~
drivers/md/dm-integrity.c:3869:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_data, 0x00, crypt_len);
^~~~~~
drivers/md/dm-integrity.c:3870:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_data, §ion_le, min((size_t)crypt_len, sizeof(section_le)));
^~~~~~
drivers/md/dm-integrity.c:3870:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_data, §ion_le, min((size_t)crypt_len, sizeof(section_le)));
^~~~~~
drivers/md/dm-integrity.c:3899:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(section_req->iv + ivsize, crypt_data, ivsize);
^~~~~~
drivers/md/dm-integrity.c:3899:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(section_req->iv + ivsize, crypt_data, ivsize);
^~~~~~
drivers/md/dm-integrity.c:4012:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &start, &dummy) != 1 || start != (sector_t)start) {
^~~~~~
drivers/md/dm-integrity.c:4012:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &start, &dummy) != 1 || start != (sector_t)start) {
^~~~~~
drivers/md/dm-integrity.c:4020:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[2], "%u%c", &ic->tag_size, &dummy) != 1 || !ic->tag_size) {
^~~~~~
drivers/md/dm-integrity.c:4020:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[2], "%u%c", &ic->tag_size, &dummy) != 1 || !ic->tag_size) {
^~~~~~
drivers/md/dm-integrity.c:4059:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(opt_string, "journal_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4059:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(opt_string, "journal_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4061:12: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
else if (sscanf(opt_string, "interleave_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4061:12: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
else if (sscanf(opt_string, "interleave_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4063:12: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
else if (sscanf(opt_string, "buffer_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4063:12: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
else if (sscanf(opt_string, "buffer_sectors:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4065:12: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
else if (sscanf(opt_string, "journal_watermark:%u%c", &val, &dummy) == 1 && val <= 100)
^~~~~~
drivers/md/dm-integrity.c:4065:12: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
else if (sscanf(opt_string, "journal_watermark:%u%c", &val, &dummy) == 1 && val <= 100)
^~~~~~
drivers/md/dm-integrity.c:4067:12: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
else if (sscanf(opt_string, "commit_time:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4067:12: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
else if (sscanf(opt_string, "commit_time:%u%c", &val, &dummy) == 1)
^~~~~~
drivers/md/dm-integrity.c:4080:14: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(opt_string, "block_size:%u%c", &val, &dummy) == 1) {
^~~~~~
drivers/md/dm-integrity.c:4080:14: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(opt_string, "block_size:%u%c", &val, &dummy) == 1) {
^~~~~~
drivers/md/dm-integrity.c:4089:14: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(opt_string, "sectors_per_bit:%llu%c", &llval, &dummy) == 1) {
^~~~~~
drivers/md/dm-integrity.c:4089:14: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(opt_string, "sectors_per_bit:%llu%c", &llval, &dummy) == 1) {
^~~~~~
drivers/md/dm-integrity.c:4091:14: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(opt_string, "bitmap_flush_interval:%u%c", &val, &dummy) == 1) {
^~~~~~
drivers/md/dm-integrity.c:4091:14: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(opt_string, "bitmap_flush_interval:%u%c", &val, &dummy) == 1) {
^~~~~~
Suppressed 46 warnings (45 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/hwtracing/coresight/coresight-etm3x-core.c:316:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(config, 0, sizeof(struct etm_config));
^~~~~~
drivers/hwtracing/coresight/coresight-etm3x-core.c:316:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(config, 0, sizeof(struct etm_config));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
80 warnings generated.
>> drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:20:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:20:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:30:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:30:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:41:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:41:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:61:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:61:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
>> drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:80:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(config, 0, sizeof(struct etm_config));
^~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:80:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(config, 0, sizeof(struct etm_config));
^~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:103:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:103:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:188:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:188:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:218:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:218:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:248:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:248:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:328:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:328:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:387:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx %#lx\n", val1, val2);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:387:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx %#lx\n", val1, val2);
^~~~~~~
>> drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:399:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%lx %lx", &val1, &val2) != 2)
^~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:399:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%lx %lx", &val1, &val2) != 2)
^~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:449:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:449:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:503:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:503:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:549:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:549:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:581:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:581:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:622:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:622:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:657:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:657:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:692:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:692:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:727:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "counter %d: %x\n",
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:727:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "counter %d: %x\n",
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:735:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret += sprintf(buf, "counter %d: %x\n", i, val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:735:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret += sprintf(buf, "counter %d: %x\n", i, val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:770:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:770:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:799:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:799:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:828:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:828:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:857:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:857:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:886:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:886:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:915:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:915:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:958:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#lx\n", val);
^~~~~~~
drivers/hwtracing/coresight/coresight-etm3x-sysfs.c:958:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#lx\n", val);
--
scan.chan = res;
^ ~~~
drivers/iio/adc/ti-ads1015.c:401:17: note: 'res' declared without an initial value
int chan, ret, res;
^~~
drivers/iio/adc/ti-ads1015.c:408:8: note: Calling 'ads1015_get_adc_result'
ret = ads1015_get_adc_result(data, chan, &res);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/ti-ads1015.c:350:6: note: Assuming 'chan' is >= 0
if (chan < 0 || chan >= ADS1015_CHANNELS)
^~~~~~~~
drivers/iio/adc/ti-ads1015.c:350:6: note: Left side of '||' is false
drivers/iio/adc/ti-ads1015.c:350:18: note: Assuming 'chan' is < ADS1015_CHANNELS
if (chan < 0 || chan >= ADS1015_CHANNELS)
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/ti-ads1015.c:350:2: note: Taking false branch
if (chan < 0 || chan >= ADS1015_CHANNELS)
^
drivers/iio/adc/ti-ads1015.c:354:6: note: Assuming 'ret' is not equal to 0
if (ret)
^~~
drivers/iio/adc/ti-ads1015.c:354:2: note: Taking true branch
if (ret)
^
drivers/iio/adc/ti-ads1015.c:355:3: note: Returning without writing to '*val'
return ret;
^
drivers/iio/adc/ti-ads1015.c:408:8: note: Returning from 'ads1015_get_adc_result'
ret = ads1015_get_adc_result(data, chan, &res);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/adc/ti-ads1015.c:409:6: note: Assuming 'ret' is >= 0
if (ret < 0) {
^~~~~~~
drivers/iio/adc/ti-ads1015.c:409:2: note: Taking false branch
if (ret < 0) {
^
drivers/iio/adc/ti-ads1015.c:414:12: note: Assigned value is garbage or undefined
scan.chan = res;
^ ~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/proximity/vcnl3020.c:76:8: warning: Excessive padding in 'struct vcnl3020_data' (61 padding bytes, where 29 is optimal).
Optimal fields order:
buf,
rev,
regmap,
dev,
lock,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct vcnl3020_data {
~~~~~~~^~~~~~~~~~~~~~~
drivers/iio/proximity/vcnl3020.c:76:8: note: Excessive padding in 'struct vcnl3020_data' (61 padding bytes, where 29 is optimal). Optimal fields order: buf, rev, regmap, dev, lock, consider reordering the fields or adding explicit padding members
struct vcnl3020_data {
~~~~~~~^~~~~~~~~~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/temperature/tsys01.c:141:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(ptr, "0x%04x ", dev_data->prom[i]);
^~~~~~~
drivers/iio/temperature/tsys01.c:141:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(ptr, "0x%04x ", dev_data->prom[i]);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/dvb-frontends/mn88472.c:659:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &mn88472_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/mn88472.c:659:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &mn88472_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/media/dvb-frontends/ec100.c:285:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->config, config, sizeof(struct ec100_config));
^~~~~~
drivers/media/dvb-frontends/ec100.c:285:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->config, config, sizeof(struct ec100_config));
^~~~~~
drivers/media/dvb-frontends/ec100.c:293:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ec100_ops,
^~~~~~
drivers/media/dvb-frontends/ec100.c:293:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ec100_ops,
^~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/pressure/mpl3115.c:170:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, sizeof(buffer));
^~~~~~
drivers/iio/pressure/mpl3115.c:170:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buffer, 0, sizeof(buffer));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/light/vcnl4000.c:734:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->near_level);
^~~~~~~
drivers/iio/light/vcnl4000.c:734:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->near_level);
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/magnetometer/ak8974.c:477:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tab, 0xFF, tab_size);
^~~~~~
drivers/iio/magnetometer/ak8974.c:477:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tab, 0xFF, tab_size);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/cx2072x.c:503:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 2, val, val_count);
^~~~~~
sound/soc/codecs/cx2072x.c:503:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 2, val, val_count);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/da7213.c:1427:3: warning: Value stored to 'indiv' is never read [clang-analyzer-deadcode.DeadStores]
indiv = DA7213_PLL_INDIV_9_TO_18_MHZ_VAL;
^
sound/soc/codecs/da7213.c:1427:3: note: Value stored to 'indiv' is never read
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
sound/soc/codecs/dmic.c:162:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dai_drv, &dmic_dai, sizeof(*dai_drv));
^~~~~~
sound/soc/codecs/dmic.c:162:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dai_drv, &dmic_dai, sizeof(*dai_drv));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/iio/light/cm32181.c:400:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "0.%06u ", cm32181->als_it_values[i]);
^~~~~~~
drivers/iio/light/cm32181.c:400:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "0.%06u ", cm32181->als_it_values[i]);
^~~~~~~
drivers/iio/light/cm32181.c:401:15: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return len + sprintf(buf + len, "\n");
^~~~~~~
drivers/iio/light/cm32181.c:401:15: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return len + sprintf(buf + len, "\n");
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
lib/xarray.c:2029:18: warning: Value stored to 'node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
lib/xarray.c:2029:18: note: Value stored to 'node' during its initialization is never read
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/hwtracing/coresight/coresight-cpu-debug.c:514:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "%d\n", debug_enable);
^~~~~~~~
drivers/hwtracing/coresight/coresight-cpu-debug.c:514:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "%d\n", debug_enable);
^~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/hwtracing/coresight/coresight-catu.c:232:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&table_ptr[i], 0,
^~~~~~
drivers/hwtracing/coresight/coresight-catu.c:232:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&table_ptr[i], 0,
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/of/address.c:89:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:89:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:430:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:430:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:449:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:449:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:502:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:502:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:820:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(struct resource));
^~~~~~
drivers/of/address.c:820:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(struct resource));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/md/dm-snap-persistent.c:294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ps->area, 0, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
drivers/md/dm-snap-persistent.c:294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ps->area, 0, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
drivers/md/dm-snap-persistent.c:385:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ps->header_area, 0, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
drivers/md/dm-snap-persistent.c:385:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ps->header_area, 0, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
drivers/md/dm-snap-persistent.c:541:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ps->area, area, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
drivers/md/dm-snap-persistent.c:541:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ps->area, area, ps->store->chunk_size << SECTOR_SHIFT);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
sound/core/pcm.c:673:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(substream->name, "subdevice #%i", idx);
^~~~~~~
sound/core/pcm.c:673:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(substream->name, "subdevice #%i", idx);
^~~~~~~
sound/core/pcm.c:956:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(runtime->status, 0, size);
^~~~~~
sound/core/pcm.c:956:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(runtime->status, 0, size);
^~~~~~
sound/core/pcm.c:966:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(runtime->control, 0, size);
^~~~~~
sound/core/pcm.c:966:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(runtime->control, 0, size);
^~~~~~
sound/core/pcm.c:1028:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", str);
^~~~~~~
sound/core/pcm.c:1028:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", str);
^~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/media/v4l2-core/v4l2-dv-timings.c:175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(t->reserved, 0, sizeof(t->reserved));
vim +106 fs/squashfs/file_direct.c
0d455c12c64286 Phillip Lougher 2013-11-13 20
0d455c12c64286 Phillip Lougher 2013-11-13 21 static int squashfs_read_cache(struct page *target_page, u64 block, int bsize,
a3f94cb99a854f Phillip Lougher 2018-08-02 22 int pages, struct page **page, int bytes);
0d455c12c64286 Phillip Lougher 2013-11-13 23
0d455c12c64286 Phillip Lougher 2013-11-13 24 /* Read separately compressed datablock directly into page cache */
a3f94cb99a854f Phillip Lougher 2018-08-02 25 int squashfs_readpage_block(struct page *target_page, u64 block, int bsize,
a3f94cb99a854f Phillip Lougher 2018-08-02 26 int expected)
0d455c12c64286 Phillip Lougher 2013-11-13 27
0d455c12c64286 Phillip Lougher 2013-11-13 28 {
0d455c12c64286 Phillip Lougher 2013-11-13 29 struct inode *inode = target_page->mapping->host;
0d455c12c64286 Phillip Lougher 2013-11-13 30 struct squashfs_sb_info *msblk = inode->i_sb->s_fs_info;
0d455c12c64286 Phillip Lougher 2013-11-13 31
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 32 int file_end = (i_size_read(inode) - 1) >> PAGE_SHIFT;
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 33 int mask = (1 << (msblk->block_log - PAGE_SHIFT)) - 1;
0d455c12c64286 Phillip Lougher 2013-11-13 34 int start_index = target_page->index & ~mask;
0d455c12c64286 Phillip Lougher 2013-11-13 35 int end_index = start_index | mask;
0d455c12c64286 Phillip Lougher 2013-11-13 36 int i, n, pages, missing_pages, bytes, res = -ENOMEM;
0d455c12c64286 Phillip Lougher 2013-11-13 37 struct page **page;
0d455c12c64286 Phillip Lougher 2013-11-13 38 struct squashfs_page_actor *actor;
0d455c12c64286 Phillip Lougher 2013-11-13 39 void *pageaddr;
0d455c12c64286 Phillip Lougher 2013-11-13 40
0d455c12c64286 Phillip Lougher 2013-11-13 41 if (end_index > file_end)
0d455c12c64286 Phillip Lougher 2013-11-13 42 end_index = file_end;
0d455c12c64286 Phillip Lougher 2013-11-13 43
0d455c12c64286 Phillip Lougher 2013-11-13 44 pages = end_index - start_index + 1;
0d455c12c64286 Phillip Lougher 2013-11-13 45
14694888db2c1f Fabian Frederick 2014-08-06 46 page = kmalloc_array(pages, sizeof(void *), GFP_KERNEL);
0d455c12c64286 Phillip Lougher 2013-11-13 47 if (page == NULL)
0d455c12c64286 Phillip Lougher 2013-11-13 48 return res;
0d455c12c64286 Phillip Lougher 2013-11-13 49
0d455c12c64286 Phillip Lougher 2013-11-13 50 /*
0d455c12c64286 Phillip Lougher 2013-11-13 51 * Create a "page actor" which will kmap and kunmap the
0d455c12c64286 Phillip Lougher 2013-11-13 52 * page cache pages appropriately within the decompressor
0d455c12c64286 Phillip Lougher 2013-11-13 53 */
0d455c12c64286 Phillip Lougher 2013-11-13 54 actor = squashfs_page_actor_init_special(page, pages, 0);
0d455c12c64286 Phillip Lougher 2013-11-13 55 if (actor == NULL)
0d455c12c64286 Phillip Lougher 2013-11-13 56 goto out;
0d455c12c64286 Phillip Lougher 2013-11-13 57
0d455c12c64286 Phillip Lougher 2013-11-13 58 /* Try to grab all the pages covered by the Squashfs block */
0d455c12c64286 Phillip Lougher 2013-11-13 59 for (missing_pages = 0, i = 0, n = start_index; i < pages; i++, n++) {
0d455c12c64286 Phillip Lougher 2013-11-13 60 page[i] = (n == target_page->index) ? target_page :
0d455c12c64286 Phillip Lougher 2013-11-13 61 grab_cache_page_nowait(target_page->mapping, n);
0d455c12c64286 Phillip Lougher 2013-11-13 62
0d455c12c64286 Phillip Lougher 2013-11-13 63 if (page[i] == NULL) {
0d455c12c64286 Phillip Lougher 2013-11-13 64 missing_pages++;
0d455c12c64286 Phillip Lougher 2013-11-13 65 continue;
0d455c12c64286 Phillip Lougher 2013-11-13 66 }
0d455c12c64286 Phillip Lougher 2013-11-13 67
0d455c12c64286 Phillip Lougher 2013-11-13 68 if (PageUptodate(page[i])) {
0d455c12c64286 Phillip Lougher 2013-11-13 69 unlock_page(page[i]);
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 70 put_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 71 page[i] = NULL;
0d455c12c64286 Phillip Lougher 2013-11-13 72 missing_pages++;
0d455c12c64286 Phillip Lougher 2013-11-13 73 }
0d455c12c64286 Phillip Lougher 2013-11-13 74 }
0d455c12c64286 Phillip Lougher 2013-11-13 75
0d455c12c64286 Phillip Lougher 2013-11-13 76 if (missing_pages) {
0d455c12c64286 Phillip Lougher 2013-11-13 77 /*
0d455c12c64286 Phillip Lougher 2013-11-13 78 * Couldn't get one or more pages, this page has either
0d455c12c64286 Phillip Lougher 2013-11-13 79 * been VM reclaimed, but others are still in the page cache
0d455c12c64286 Phillip Lougher 2013-11-13 80 * and uptodate, or we're racing with another thread in
0d455c12c64286 Phillip Lougher 2013-11-13 81 * squashfs_readpage also trying to grab them. Fall back to
0d455c12c64286 Phillip Lougher 2013-11-13 82 * using an intermediate buffer.
0d455c12c64286 Phillip Lougher 2013-11-13 83 */
0d455c12c64286 Phillip Lougher 2013-11-13 84 res = squashfs_read_cache(target_page, block, bsize, pages,
a3f94cb99a854f Phillip Lougher 2018-08-02 85 page, expected);
6d565409503f4e Phillip Lougher 2013-11-24 86 if (res < 0)
6d565409503f4e Phillip Lougher 2013-11-24 87 goto mark_errored;
6d565409503f4e Phillip Lougher 2013-11-24 88
0d455c12c64286 Phillip Lougher 2013-11-13 89 goto out;
0d455c12c64286 Phillip Lougher 2013-11-13 90 }
0d455c12c64286 Phillip Lougher 2013-11-13 91
0d455c12c64286 Phillip Lougher 2013-11-13 92 /* Decompress directly into the page cache buffers */
0d455c12c64286 Phillip Lougher 2013-11-13 93 res = squashfs_read_data(inode->i_sb, block, bsize, NULL, actor);
0d455c12c64286 Phillip Lougher 2013-11-13 94 if (res < 0)
0d455c12c64286 Phillip Lougher 2013-11-13 95 goto mark_errored;
0d455c12c64286 Phillip Lougher 2013-11-13 96
a3f94cb99a854f Phillip Lougher 2018-08-02 97 if (res != expected) {
a3f94cb99a854f Phillip Lougher 2018-08-02 98 res = -EIO;
a3f94cb99a854f Phillip Lougher 2018-08-02 99 goto mark_errored;
a3f94cb99a854f Phillip Lougher 2018-08-02 100 }
a3f94cb99a854f Phillip Lougher 2018-08-02 101
0d455c12c64286 Phillip Lougher 2013-11-13 102 /* Last page may have trailing bytes not filled */
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 103 bytes = res % PAGE_SIZE;
0d455c12c64286 Phillip Lougher 2013-11-13 104 if (bytes) {
0d455c12c64286 Phillip Lougher 2013-11-13 105 pageaddr = kmap_atomic(page[pages - 1]);
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 @106 memset(pageaddr + bytes, 0, PAGE_SIZE - bytes);
0d455c12c64286 Phillip Lougher 2013-11-13 107 kunmap_atomic(pageaddr);
0d455c12c64286 Phillip Lougher 2013-11-13 108 }
0d455c12c64286 Phillip Lougher 2013-11-13 109
0d455c12c64286 Phillip Lougher 2013-11-13 110 /* Mark pages as uptodate, unlock and release */
0d455c12c64286 Phillip Lougher 2013-11-13 111 for (i = 0; i < pages; i++) {
0d455c12c64286 Phillip Lougher 2013-11-13 112 flush_dcache_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 113 SetPageUptodate(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 114 unlock_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 115 if (page[i] != target_page)
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 116 put_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 117 }
0d455c12c64286 Phillip Lougher 2013-11-13 118
0d455c12c64286 Phillip Lougher 2013-11-13 119 kfree(actor);
0d455c12c64286 Phillip Lougher 2013-11-13 120 kfree(page);
0d455c12c64286 Phillip Lougher 2013-11-13 121
0d455c12c64286 Phillip Lougher 2013-11-13 122 return 0;
0d455c12c64286 Phillip Lougher 2013-11-13 123
0d455c12c64286 Phillip Lougher 2013-11-13 124 mark_errored:
0d455c12c64286 Phillip Lougher 2013-11-13 125 /* Decompression failed, mark pages as errored. Target_page is
0d455c12c64286 Phillip Lougher 2013-11-13 126 * dealt with by the caller
0d455c12c64286 Phillip Lougher 2013-11-13 127 */
0d455c12c64286 Phillip Lougher 2013-11-13 128 for (i = 0; i < pages; i++) {
6d565409503f4e Phillip Lougher 2013-11-24 129 if (page[i] == NULL || page[i] == target_page)
0d455c12c64286 Phillip Lougher 2013-11-13 130 continue;
0d455c12c64286 Phillip Lougher 2013-11-13 131 flush_dcache_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 132 SetPageError(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 133 unlock_page(page[i]);
09cbfeaf1a5a67 Kirill A. Shutemov 2016-04-01 134 put_page(page[i]);
0d455c12c64286 Phillip Lougher 2013-11-13 135 }
0d455c12c64286 Phillip Lougher 2013-11-13 136
0d455c12c64286 Phillip Lougher 2013-11-13 137 out:
0d455c12c64286 Phillip Lougher 2013-11-13 138 kfree(actor);
0d455c12c64286 Phillip Lougher 2013-11-13 139 kfree(page);
0d455c12c64286 Phillip Lougher 2013-11-13 140 return res;
0d455c12c64286 Phillip Lougher 2013-11-13 141 }
0d455c12c64286 Phillip Lougher 2013-11-13 142
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
* Re: [PATCH 1/3] [v3] Kbuild: move to -std=gnu11
@ 2022-03-04 2:47 kernel test robot
0 siblings, 0 replies; 34+ messages in thread
From: kernel test robot @ 2022-03-04 2:47 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 37271 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220301145233.3689119-1-arnd@kernel.org>
References: <20220301145233.3689119-1-arnd@kernel.org>
TO: Arnd Bergmann <arnd@kernel.org>
TO: Masahiro Yamada <masahiroy@kernel.org>
CC: Arnd Bergmann <arnd@arndb.de>
CC: Marco Elver <elver@google.com>
CC: Jani Nikula <jani.nikula@intel.com>
CC: David Sterba <dsterba@suse.com>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Mark Rutland <mark.rutland@arm.com>
CC: linux-kbuild(a)vger.kernel.org
CC: llvm(a)lists.linux.dev
CC: linux-doc(a)vger.kernel.org
CC: linux-kernel(a)vger.kernel.org
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on masahiroy-kbuild/for-next drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc6 next-20220303]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 2 days ago
:::::: commit date: 2 days ago
config: arm-randconfig-c002-20220302 (https://download.01.org/0day-ci/archive/20220304/202203040957.H2ndD30L-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
# https://github.com/0day-ci/linux/commit/afebabb39f6a871f6e6d69f601738fbce1c1b37c
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-move-to-std-gnu11/20220301-225348
git checkout afebabb39f6a871f6e6d69f601738fbce1c1b37c
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2225:2: note: Taking false branch
if (!hw->buff)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2233:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2233:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2238:3: note: Taking false branch
if (!hw->iio_devs[i])
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2238:3: note: Taking false branch
if (!hw->iio_devs[i])
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2236:2: note: Loop condition is false. Execution continues on line 2242
for (i = 0; i < ST_LSM6DSX_ID_EXT0; i++) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:2242:8: note: Calling 'st_lsm6dsx_init_device'
err = st_lsm6dsx_init_device(hw);
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1926:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1926:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1933:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1933:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1938:6: note: 'err' is >= 0
if (err < 0)
^~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1938:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1943:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1943:2: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1947:6: note: Assuming field 'addr' is 0
if (hw->settings->irq_config.lir.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1947:2: note: Taking false branch
if (hw->settings->irq_config.lir.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1966:6: note: Assuming field 'addr' is 0
if (hw->settings->drdy_mask.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1966:2: note: Taking false branch
if (hw->settings->drdy_mask.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1974:8: note: Calling 'st_lsm6dsx_init_shub'
err = st_lsm6dsx_init_shub(hw);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1781:7: note: Assuming the condition is false
if ((dev_fwnode(dev) && device_property_read_bool(dev, "st,pullups")) ||
^~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1781:23: note: Left side of '&&' is false
if ((dev_fwnode(dev) && device_property_read_bool(dev, "st,pullups")) ||
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1782:7: note: Assuming 'pdata' is null
(pdata && pdata->pullups)) {
^~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1782:13: note: Left side of '&&' is false
(pdata && pdata->pullups)) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1801:6: note: Assuming field 'addr' is not equal to 0
if (hub_settings->aux_sens.addr) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1801:2: note: Taking true branch
if (hub_settings->aux_sens.addr) {
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1804:7: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1804:3: note: Taking false branch
if (err < 0)
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx_core.c:1807:10: note: The result of the left shift is undefined due to shifting '3' by '31', which is unrepresentable in the unsigned version of the return type 'int'
data = ST_LSM6DSX_SHIFT_VAL(3, hub_settings->aux_sens.mask);
^
drivers/iio/imu/st_lsm6dsx/st_lsm6dsx.h:65:49: note: expanded from macro 'ST_LSM6DSX_SHIFT_VAL'
#define ST_LSM6DSX_SHIFT_VAL(val, mask) (((val) << __ffs(mask)) & (mask))
~~~~~ ^
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/hwtracing/coresight/coresight-cpu-debug.c:514:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "%d\n", debug_enable);
^~~~~~~~
drivers/hwtracing/coresight/coresight-cpu-debug.c:514:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "%d\n", debug_enable);
^~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/hwtracing/coresight/coresight-catu.c:232:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&table_ptr[i], 0,
^~~~~~
drivers/hwtracing/coresight/coresight-catu.c:232:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&table_ptr[i], 0,
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/hwtracing/coresight/coresight-cti-core.c:447:2: warning: Value stored to 'reg_value' is never read [clang-analyzer-deadcode.DeadStores]
reg_value = config->ctiappset;
^ ~~~~~~~~~~~~~~~~~
drivers/hwtracing/coresight/coresight-cti-core.c:447:2: note: Value stored to 'reg_value' is never read
reg_value = config->ctiappset;
^ ~~~~~~~~~~~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
84 warnings generated.
drivers/hwtracing/coresight/coresight-cti-sysfs.c:94:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", enabled);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:94:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", enabled);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:96:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!enable_req);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:96:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!enable_req);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:132:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", powered);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:132:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", powered);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:141:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drvdata->ctidev.ctm_id);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:141:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drvdata->ctidev.ctm_id);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:151:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drvdata->ctidev.nr_trig_con);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:151:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drvdata->ctidev.nr_trig_con);
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:184:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devaff0, CTIDEVAFF0);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:184:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devaff0, CTIDEVAFF0);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:185:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devaff1, CTIDEVAFF1);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:185:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(devaff1, CTIDEVAFF1);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:186:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(authstatus, CORESIGHT_AUTHSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:186:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
coresight_cti_reg(authstatus, CORESIGHT_AUTHSTATUS);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
^~~~~~~
drivers/hwtracing/coresight/coresight-cti-sysfs.c:187:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
coresight_cti_reg(devarch, CORESIGHT_DEVARCH);
^
drivers/hwtracing/coresight/coresight-cti-sysfs.c:179:9: note: expanded from macro 'coresight_cti_reg'
return sprintf(buf, "0x%x\n", val); \
--
drivers/hwtracing/intel_th/gth.c:335:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%x\n",
^~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
sound/soc/codecs/wsa881x.c:747:25: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
unsigned int mask = (1 << fls(max)) - 1;
^ ~~~~~~~~
sound/soc/codecs/wsa881x.c:747:28: note: Calling 'fls'
unsigned int mask = (1 << fls(max)) - 1;
^~~~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0, which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
sound/soc/codecs/wsa881x.c:747:28: note: Returning from 'fls'
unsigned int mask = (1 << fls(max)) - 1;
^~~~~~~~
sound/soc/codecs/wsa881x.c:747:25: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
unsigned int mask = (1 << fls(max)) - 1;
^ ~~~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/cx2072x.c:503:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 2, val, val_count);
^~~~~~
sound/soc/codecs/cx2072x.c:503:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 2, val, val_count);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/da7213.c:1427:3: warning: Value stored to 'indiv' is never read [clang-analyzer-deadcode.DeadStores]
indiv = DA7213_PLL_INDIV_9_TO_18_MHZ_VAL;
^
sound/soc/codecs/da7213.c:1427:3: note: Value stored to 'indiv' is never read
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
sound/soc/codecs/dmic.c:162:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dai_drv, &dmic_dai, sizeof(*dai_drv));
^~~~~~
sound/soc/codecs/dmic.c:162:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dai_drv, &dmic_dai, sizeof(*dai_drv));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/hwtracing/coresight/coresight-sysfs.c:22:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", csdev->nr_links);
^~~~~~~
drivers/hwtracing/coresight/coresight-sysfs.c:22:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", csdev->nr_links);
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
sound/soc/codecs/sigmadsp-i2c.c:27:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 2, data, len);
^~~~~~
sound/soc/codecs/sigmadsp-i2c.c:27:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 2, data, len);
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/md/dm-dust.c:358:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1 || tmp != (sector_t)tmp) {
^~~~~~
drivers/md/dm-dust.c:358:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1 || tmp != (sector_t)tmp) {
^~~~~~
drivers/md/dm-dust.c:461:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:461:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:481:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:481:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[1], "%llu%c", &tmp, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:484:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(argv[2], "%u%c", &tmp_ui, &dummy) != 1)
^~~~~~
drivers/md/dm-dust.c:484:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(argv[2], "%u%c", &tmp_ui, &dummy) != 1)
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
sound/soc/codecs/wm8731.c:106:3: warning: Value stored to 'best' is never read [clang-analyzer-deadcode.DeadStores]
best = 0;
^ ~
sound/soc/codecs/wm8731.c:106:3: note: Value stored to 'best' is never read
best = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
sound/soc/codecs/wm8741.c:561:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&wm8741->pdata, pdata, sizeof(wm8741->pdata));
^~~~~~
sound/soc/codecs/wm8741.c:561:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&wm8741->pdata, pdata, sizeof(wm8741->pdata));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
sound/soc/codecs/cs42l42.c:605:8: warning: Excessive padding in 'struct cs42l42_pll_params' (5 padding bytes, where 1 is optimal).
Optimal fields order:
sclk,
pll_div_frac,
mclk_int,
mclk_src_sel,
sclk_prediv,
pll_div_int,
pll_mode,
pll_divout,
pll_cal_ratio,
n,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct cs42l42_pll_params {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/cs42l42.c:605:8: note: Excessive padding in 'struct cs42l42_pll_params' (5 padding bytes, where 1 is optimal). Optimal fields order: sclk, pll_div_frac, mclk_int, mclk_src_sel, sclk_prediv, pll_div_int, pll_mode, pll_divout, pll_cal_ratio, n, consider reordering the fields or adding explicit padding members
struct cs42l42_pll_params {
vim +514 drivers/hwtracing/coresight/coresight-cpu-debug.c
2227b7c7463402c Leo Yan 2017-06-05 506
2227b7c7463402c Leo Yan 2017-06-05 507 static ssize_t debug_func_knob_read(struct file *f,
2227b7c7463402c Leo Yan 2017-06-05 508 char __user *ubuf, size_t count, loff_t *ppos)
2227b7c7463402c Leo Yan 2017-06-05 509 {
2227b7c7463402c Leo Yan 2017-06-05 510 ssize_t ret;
2227b7c7463402c Leo Yan 2017-06-05 511 char buf[3];
2227b7c7463402c Leo Yan 2017-06-05 512
2227b7c7463402c Leo Yan 2017-06-05 513 mutex_lock(&debug_lock);
2227b7c7463402c Leo Yan 2017-06-05 @514 snprintf(buf, sizeof(buf), "%d\n", debug_enable);
2227b7c7463402c Leo Yan 2017-06-05 515 mutex_unlock(&debug_lock);
2227b7c7463402c Leo Yan 2017-06-05 516
2227b7c7463402c Leo Yan 2017-06-05 517 ret = simple_read_from_buffer(ubuf, count, ppos, buf, sizeof(buf));
2227b7c7463402c Leo Yan 2017-06-05 518 return ret;
2227b7c7463402c Leo Yan 2017-06-05 519 }
2227b7c7463402c Leo Yan 2017-06-05 520
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] 34+ messages in thread
end of thread, other threads:[~2022-03-14 12:00 UTC | newest]
Thread overview: 34+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-01 14:52 [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Arnd Bergmann
2022-03-01 14:52 ` [PATCH 2/3] treewide: use -Wdeclaration-after-statement Arnd Bergmann
2022-03-01 16:54 ` Nathan Chancellor
2022-03-01 19:57 ` Nick Desaulniers
2022-03-01 20:06 ` Nick Desaulniers
2022-03-01 20:20 ` Linus Torvalds
2022-03-01 20:28 ` Nick Desaulniers
2022-03-03 0:44 ` Masahiro Yamada
2022-03-04 11:29 ` Sedat Dilek
2022-03-06 10:03 ` Sedat Dilek
2022-03-01 14:52 ` [PATCH 3/3] Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS Arnd Bergmann
2022-03-01 17:00 ` Nathan Chancellor
2022-03-01 19:56 ` Nick Desaulniers
2022-03-02 22:14 ` Sedat Dilek
2022-03-02 22:54 ` Nick Desaulniers
2022-03-03 6:26 ` Sedat Dilek
2022-03-03 17:37 ` Nathan Chancellor
2022-03-04 6:47 ` Sedat Dilek
2022-03-04 7:18 ` Sedat Dilek
2022-03-04 11:12 ` Sedat Dilek
2022-03-06 10:04 ` Sedat Dilek
2022-03-01 16:53 ` [PATCH 1/3] [v3] Kbuild: move to -std=gnu11 Nathan Chancellor
2022-03-04 5:03 ` Masahiro Yamada
2022-03-04 11:24 ` Sedat Dilek
2022-03-06 10:01 ` Sedat Dilek
2022-03-04 11:37 ` Sedat Dilek
2022-03-04 16:25 ` Sedat Dilek
2022-03-06 15:31 ` Sedat Dilek
2022-03-04 2:47 kernel test robot
2022-03-04 8:24 kernel test robot
2022-03-10 1:27 kernel test robot
2022-03-10 10:17 kernel test robot
2022-03-12 19:44 kernel test robot
2022-03-14 12:00 kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.