* [linux-next:master 11491/14215] drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arg...
@ 2022-03-22 20:20 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2022-03-22 20:20 UTC (permalink / raw
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 1126547 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: Linux Memory Management List <linux-mm@kvack.org>
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head: f8833a2b23562be2dae91775127c8014c44d8566
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 [11491/14215] Kbuild: move to -std=gnu11
:::::: branch date: 11 hours ago
:::::: commit date: 10 days ago
config: riscv-randconfig-c006-20220321 (https://download.01.org/0day-ci/archive/20220323/202203230414.nrXG75G9-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 85e9b2687a13d1908aa86d1b89c5ce398a06cd39)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install riscv cross compiling tool for clang build
# apt-get install binutils-riscv64-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
git fetch --no-tags linux-next master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
^~~~~~
drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/gpu/drm/bridge/ti-sn65dsi86.c:891:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sink_rates, 0, sizeof(sink_rates));
^~~~~~
drivers/gpu/drm/bridge/ti-sn65dsi86.c:891:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sink_rates, 0, sizeof(sink_rates));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_audio.c:390:2: warning: Value stored to 'value' is never read [clang-analyzer-deadcode.DeadStores]
value = AZ_REG_READ(AZALIA_F0_CODEC_PIN_CONTROL_HOT_PLUG_CONTROL);
^
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_audio.c:390:2: note: Value stored to 'value' is never read
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_link_encoder.c:310:2: warning: Value stored to 'value' is never read [clang-analyzer-deadcode.DeadStores]
value = REG_READ(DP_DPHY_INTERNAL_CTRL);
^
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_link_encoder.c:310:2: note: Value stored to 'value' is never read
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (56 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:38:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:38:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0, sizeof(cmd));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:45:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&cmd.lock_hw.lock_hw_data.inst_flags, inst_flags, sizeof(struct dmub_hw_lock_inst_flags));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:45:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&cmd.lock_hw.lock_hw_data.inst_flags, inst_flags, sizeof(struct dmub_hw_lock_inst_flags));
^~~~~~
Suppressed 57 warnings (56 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_outbox.c:40:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cmd, 0x0, sizeof(cmd));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_outbox.c:40:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cmd, 0x0, sizeof(cmd));
^~~~~~
Suppressed 56 warnings (55 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
>> drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s,type=0x%x\n",
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s,type=0x%x\n",
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
^~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
^~~~~~~~
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/inode.c:407:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mapping, 0, sizeof(*mapping));
^~~~~~
fs/inode.c:407:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mapping, 0, sizeof(*mapping));
^~~~~~
fs/inode.c:419:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(inode, 0, sizeof(*inode));
^~~~~~
fs/inode.c:419:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(inode, 0, sizeof(*inode));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
92 warnings generated.
fs/file.c:61:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:61:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:62:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:62:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:63:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:63:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:69:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:69:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:84:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:84:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:85:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:85:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:371:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
^~~~~~
fs/file.c:371:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:308:6: note: Assuming the condition is false
if (i2c_transfer(&i2c_bus->adapter, msgs, 2) == 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:308:2: note: Taking false branch
if (i2c_transfer(&i2c_bus->adapter, msgs, 2) == 2) {
^
drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:312:3: note: 4th function call argument is an uninitialized value
DRM_DEBUG("i2c 0x%02x 0x%02x read failed\n",
^
include/drm/drm_print.h:526:2: note: expanded from macro 'DRM_DEBUG'
__drm_dbg(DRM_UT_CORE, fmt, ##__VA_ARGS__)
^ ~~~~~~~~~~~
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/gpu/drm/panel/panel-tpo-tpg110.c:43:8: warning: Excessive padding in 'struct tpg110_panel_mode' (8 padding bytes, where 0 is optimal).
Optimal fields order:
name,
mode,
magic,
bus_flags,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct tpg110_panel_mode {
~~~~~~~^~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/panel/panel-tpo-tpg110.c:43:8: note: Excessive padding in 'struct tpg110_panel_mode' (8 padding bytes, where 0 is optimal). Optimal fields order: name, mode, magic, bus_flags, consider reordering the fields or adding explicit padding members
struct tpg110_panel_mode {
~~~~~~~^~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/panel/panel-tpo-tpg110.c:198:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(t, 0, sizeof(t));
^~~~~~
drivers/gpu/drm/panel/panel-tpo-tpg110.c:198:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(t, 0, sizeof(t));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/gpu/drm/bridge/cdns-dsi.c:517:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dsi_cfg, 0, sizeof(*dsi_cfg));
^~~~~~
drivers/gpu/drm/bridge/cdns-dsi.c:517:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dsi_cfg, 0, sizeof(*dsi_cfg));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/misc/cb710/sgbuf2.c:33:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, miter->addr + miter->consumed, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:33:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, miter->addr + miter->consumed, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, left);
^~~~~~
drivers/misc/cb710/sgbuf2.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, left);
^~~~~~
drivers/misc/cb710/sgbuf2.c:108:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(miter->addr, addr, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:108:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(miter->addr, addr, len);
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/misc/cb710/debug.c:96:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:96:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
>> drivers/misc/cb710/debug.c:96:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:96:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:97:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:97:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:97:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:97:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:98:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:98:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:98:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:98:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:692:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&gds_info, 0, sizeof(gds_info));
^~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:692:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&gds_info, 0, sizeof(gds_info));
^~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:720:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mem, 0, sizeof(mem));
--
irq_level,
phys_reg_addr,
idle_mode,
max_frame_size,
rbuf_fill_level,
rx_pio,
if_mode,
base_clock,
xsync,
xctrl,
init_error,
tx_count,
dcd_chkcount,
cts_chkcount,
dsr_chkcount,
ri_chkcount,
rbuf_count,
rbuf_current,
rbuf_index,
rbuf_fill_index,
tbuf_count,
tbuf_current,
tbuf_start,
tmp_rbuf_count,
netcount,
input_signal_events,
icount,
rbuf_fill_count,
bh_requested,
bh_running,
irq_requested,
irq_occurred,
reg_addr_requested,
rx_enabled,
rx_restart,
tx_enabled,
tx_active,
signals,
drop_rts_on_tx_done,
device_name,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct slgt_info {
~~~~~~~^~~~~~~~~~~
drivers/tty/synclink_gt.c:212:8: note: Excessive padding in 'struct slgt_info' (46 padding bytes, where 6 is optimal). Optimal fields order: if_ptr, next_device, pdev, gpio_wait_q, irq_flags, reg_addr, tx_buf, flag_buf, bufs, bufs_dma_addr, rbufs, tbufs, tmp_rbuf, port_array, params, lock, netlock, task, status_event_wait_q, event_wait_q, tx_timer, rx_timer, port, magic, port_count, adapter_num, port_num, line, timeout, x_char, read_status_mask, ignore_status_mask, gpio_present, pending_bh, isr_overflow, bus_type, irq_level, phys_reg_addr, idle_mode, max_frame_size, rbuf_fill_level, rx_pio, if_mode, base_clock, xsync, xctrl, init_error, tx_count, dcd_chkcount, cts_chkcount, dsr_chkcount, ri_chkcount, rbuf_count, rbuf_current, rbuf_index, rbuf_fill_index, tbuf_count, tbuf_current, tbuf_start, tmp_rbuf_count, netcount, input_signal_events, icount, rbuf_fill_count, bh_requested, bh_running, irq_requested, irq_occurred, reg_addr_requested, rx_enabled, rx_restart, tx_enabled, tx_active, signals, drop_rts_on_tx_done, device_name, consider reordering the fields or adding explicit padding members
struct slgt_info {
~~~~~~~^~~~~~~~~~~
drivers/tty/synclink_gt.c:1190:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RTS");
^~~~~~
drivers/tty/synclink_gt.c:1190:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RTS");
^~~~~~
drivers/tty/synclink_gt.c:1192:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CTS");
^~~~~~
drivers/tty/synclink_gt.c:1192:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CTS");
^~~~~~
drivers/tty/synclink_gt.c:1194:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DTR");
^~~~~~
drivers/tty/synclink_gt.c:1194:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DTR");
^~~~~~
drivers/tty/synclink_gt.c:1196:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DSR");
^~~~~~
drivers/tty/synclink_gt.c:1196:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DSR");
^~~~~~
drivers/tty/synclink_gt.c:1198:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CD");
^~~~~~
drivers/tty/synclink_gt.c:1198:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CD");
^~~~~~
drivers/tty/synclink_gt.c:1200:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RI");
^~~~~~
drivers/tty/synclink_gt.c:1200:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RI");
^~~~~~
drivers/tty/synclink_gt.c:2352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2515:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2515:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2544:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:2544:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
^~~~~~
>> drivers/tty/synclink_gt.c:3430:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
^~~~~~~
drivers/tty/synclink_gt.c:3430:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
^~~~~~~
drivers/tty/synclink_gt.c:3507:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:3507:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:3554:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
^~~~~~
drivers/tty/synclink_gt.c:3554:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
^~~~~~
drivers/tty/synclink_gt.c:4646:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, info->rbufs[i].buf, partial_count);
^~~~~~
drivers/tty/synclink_gt.c:4646:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, info->rbufs[i].buf, partial_count);
^~~~~~
drivers/tty/synclink_gt.c:4820:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(d->buf, buf, count);
^~~~~~
drivers/tty/synclink_gt.c:4820:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(d->buf, buf, count);
^~~~~~
drivers/tty/synclink_gt.c:4959:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(¶ms, &info->params, sizeof(params));
^~~~~~
drivers/tty/synclink_gt.c:4959:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(¶ms, &info->params, sizeof(params));
^~~~~~
drivers/tty/synclink_gt.c:4971:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
^~~~~~
drivers/tty/synclink_gt.c:4971:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
^~~~~~
drivers/tty/synclink_gt.c:4999:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params, ¶ms, sizeof(info->params));
^~~~~~
drivers/tty/synclink_gt.c:4999:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params, ¶ms, sizeof(info->params));
^~~~~~
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:50:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:50:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:70:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&out, &buf[1], num);
^~~~~~
drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:70:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&out, &buf[1], num);
^~~~~~
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
Suppressed 58 warnings (58 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:199:50: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return round_up(adev->vm_manager.max_pfn, 1ULL << shift)
^
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3054:26: note: Assuming field 'asic_type' is not equal to CHIP_RAVEN
bool pte_support_ats = (adev->asic_type == CHIP_RAVEN);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3058:6: note: 'r' is 0
if (r)
^
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3058:2: note: Taking false branch
if (r)
^
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3062:6: note: Calling 'amdgpu_vm_check_clean_reserved'
r = amdgpu_vm_check_clean_reserved(adev, vm);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3022:25: note: Calling 'amdgpu_vm_num_entries'
unsigned int entries = amdgpu_vm_num_entries(adev, root);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:19: note: Calling 'amdgpu_vm_level_shift'
unsigned shift = amdgpu_vm_level_shift(adev,
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:169:2: note: Control jumps to the 'default' case at line 177
switch (level) {
^
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:178:3: note: Returning the value 4294967295
return ~0;
^~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:19: note: Returning from 'amdgpu_vm_level_shift'
unsigned shift = amdgpu_vm_level_shift(adev,
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:2: note: 'shift' initialized to 4294967295
unsigned shift = amdgpu_vm_level_shift(adev,
--
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2710:6: note: Assuming the condition is true
if (RSS_AQ(adapter)) {
^
drivers/net/ethernet/intel/iavf/iavf.h:363:21: note: expanded from macro 'RSS_AQ'
#define RSS_AQ(_a) ((_a)->vf_res->vf_cap_flags & \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:2710:2: note: Taking true branch
if (RSS_AQ(adapter)) {
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2734:2: note: Loop condition is true. Entering loop body
list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2735:3: note: Taking true branch
if (ether_addr_equal(f->macaddr, adapter->hw.mac.addr)) {
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2737:4: note: Memory is released
kfree(f);
^~~~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:2734:2: note: Loop condition is false. Execution continues on line 2741
list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
^
include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2741:2: note: Loop condition is true. Entering loop body
list_for_each_entry(f, &adapter->mac_filter_list, list) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/net/ethernet/intel/iavf/iavf_main.c:2742:10: note: Use of memory after it is freed
f->add = true;
~~~~~~ ^
drivers/net/ethernet/intel/iavf/iavf_main.c:2847:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(event.msg_buf, 0, IAVF_MAX_AQ_BUF_SIZE);
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:2847:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(event.msg_buf, 0, IAVF_MAX_AQ_BUF_SIZE);
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3455:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vf->data.tcp_spec.dst_ip, &match.key->dst.s6_addr32,
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3455:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vf->data.tcp_spec.dst_ip, &match.key->dst.s6_addr32,
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3459:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vf->data.tcp_spec.src_ip, &match.key->src.s6_addr32,
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3459:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vf->data.tcp_spec.src_ip, &match.key->src.s6_addr32,
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3556:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&filter->f.mask.tcp_spec, 0, sizeof(struct virtchnl_l4_spec));
^~~~~~
drivers/net/ethernet/intel/iavf/iavf_main.c:3556:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&filter->f.mask.tcp_spec, 0, sizeof(struct virtchnl_l4_spec));
^~~~~~
Suppressed 109 warnings (109 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
127 warnings generated.
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: warning: Value stored to 'num_msix' is never read [clang-analyzer-deadcode.DeadStores]
num_msix = adapter->ahw->num_msix;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: note: Value stored to 'num_msix' is never read
num_msix = adapter->ahw->num_msix;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
^~~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%pM: %s" , adapter->mac_addr,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%pM: %s" , adapter->mac_addr,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: warning: Value stored to 'priv_level' is never read [clang-analyzer-deadcode.DeadStores]
priv_level = QLC_DEV_GET_DRV(op_mode, adapter->ahw->pci_func);
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: note: Value stored to 'priv_level' is never read
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tx_ring->name, sizeof(tx_ring->name),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tx_ring->name, sizeof(tx_ring->name),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&adapter->stats, 0, sizeof(adapter->stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&adapter->stats, 0, sizeof(adapter->stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2602:3: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
qlcnic_dcb_get_info(adapter->dcb);
^ ~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:2: note: Taking false branch
if (err)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:6: note: Assuming the condition is false
if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:2: note: Taking false branch
if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: 64 is equal to 64
err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: '?' condition is true
err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:6: note: 'err' is 0
if (err) {
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:2: note: Taking false branch
if (err) {
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:2: note: Taking false branch
if (err)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:6: note: Assuming 'ahw' is non-null
if (!ahw) {
^~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:2: note: Taking false branch
--
drivers/net/ethernet/qlogic/qed/qed_debug.c:2606:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf, name);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buf + strlen(buf), mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf + strlen(buf), mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buf, mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf, mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
^~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
^~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dump_buf + offset, 0,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dump_buf + offset, 0,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hdr, 0, sizeof(*hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hdr, 0, sizeof(*hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: warning: Value stored to 'byte_buf' is never read [clang-analyzer-deadcode.DeadStores]
byte_buf += sizeof(signature);
^ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: note: Value stored to 'byte_buf' is never read
byte_buf += sizeof(signature);
^ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: warning: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal).
Optimal fields order:
desc,
vf_desc,
type,
start_addr,
end_addr,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct igu_fifo_addr_data {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: note: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). Optimal fields order: desc, vf_desc, type, start_addr, end_addr, consider reordering the fields or adding explicit padding members
struct igu_fifo_addr_data {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(dest, source_str, size);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(dest, source_str, size);
^~~~~~~
>> drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
--
^~~~~~
drivers/scsi/device_handler/scsi_dh_emc.c:430:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if ((sscanf(params, "%u", &argc) != 1) || (argc != 2))
^~~~~~
drivers/scsi/device_handler/scsi_dh_emc.c:435:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if ((sscanf(p, "%u", &st) != 1) || (st > 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_emc.c:435:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if ((sscanf(p, "%u", &st) != 1) || (st > 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_emc.c:440:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if ((sscanf(p, "%u", &hr) != 1) || (hr > 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_emc.c:440:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if ((sscanf(p, "%u", &hr) != 1) || (hr > 1))
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/scsi/device_handler/scsi_dh_alua.c:134:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cdb, 0x0, MAX_COMMAND_SIZE);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:134:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cdb, 0x0, MAX_COMMAND_SIZE);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:164:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stpg_data, 0, stpg_len);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:164:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stpg_data, 0, stpg_len);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:169:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cdb, 0x0, MAX_COMMAND_SIZE);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:169:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cdb, 0x0, MAX_COMMAND_SIZE);
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:1056:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if ((sscanf(params, "%u", &argc) != 1) || (argc != 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:1056:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if ((sscanf(params, "%u", &argc) != 1) || (argc != 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:1061:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if ((sscanf(p, "%u", &optimize) != 1) || (optimize > 1))
^~~~~~
drivers/scsi/device_handler/scsi_dh_alua.c:1061:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if ((sscanf(p, "%u", &optimize) != 1) || (optimize > 1))
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
108 warnings generated.
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, qlcnic_get_regs_len(dev));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, qlcnic_get_regs_len(dev));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + ETH_ALEN, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + ETH_ALEN, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, *qlcnic_gstrings_test,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, *qlcnic_gstrings_test,
^~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx_queue_%d %s", i,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx_queue_%d %s", i,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tx_stats, 0, sizeof(tx_stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tx_stats, 0, sizeof(tx_stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, stats->n_stats * sizeof(u64));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, stats->n_stats * sizeof(u64));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: warning: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index' [clang-analyzer-deadcode.DeadStores]
for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
^ ~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: note: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index'
for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
^ ~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:6: note: Assuming field 'rx_mini_pending' is 0
if (ring->rx_mini_pending)
^~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:2: note: Taking false branch
if (ring->rx_mini_pending)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:678:12: note: Calling 'qlcnic_validate_ringparam'
num_rxd = qlcnic_validate_ringparam(ring->rx_pending,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:654:13: note: Assuming '__UNIQUE_ID___x462' is > '__UNIQUE_ID___y463'
num_desc = max(val, min);
^
include/linux/minmax.h:52:19: note: expanded from macro 'max'
#define max(x, y) __careful_cmp(x, y, >)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
--
^~~~~~~~
drivers/input/keyboard/newtonkbd.c:81:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(nkbd->phys, sizeof(nkbd->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/keyboard/newtonkbd.c:82:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nkbd->keycode, nkbd_keycode, sizeof(nkbd->keycode));
^~~~~~
drivers/input/keyboard/newtonkbd.c:82:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nkbd->keycode, nkbd_keycode, sizeof(nkbd->keycode));
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
90 warnings generated.
net/decnet/dn_dev.c:475:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/decnet/dn_dev.c:475:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/decnet/dn_dev.c:661:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/decnet/dn_dev.c:661:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/decnet/dn_dev.c:848:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->tiver, dn_eco_version, 3);
^~~~~~
net/decnet/dn_dev.c:848:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->tiver, dn_eco_version, 3);
^~~~~~
net/decnet/dn_dev.c:853:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg->seed, 0, 8);
^~~~~~
net/decnet/dn_dev.c:853:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg->seed, 0, 8);
^~~~~~
net/decnet/dn_dev.c:854:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg->neighbor, dn_hiord, ETH_ALEN);
^~~~~~
net/decnet/dn_dev.c:854:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg->neighbor, dn_hiord, ETH_ALEN);
^~~~~~
net/decnet/dn_dev.c:864:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg->data, 0xAA, 2);
^~~~~~
net/decnet/dn_dev.c:864:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg->data, 0xAA, 2);
^~~~~~
net/decnet/dn_dev.c:947:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr, 0, 7); /* Name: Reserved */
^~~~~~
net/decnet/dn_dev.c:947:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr, 0, 7); /* Name: Reserved */
^~~~~~
net/decnet/dn_dev.c:1093:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dn_db->parms, p, sizeof(struct dn_dev_parms));
^~~~~~
net/decnet/dn_dev.c:1093:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dn_db->parms, p, sizeof(struct dn_dev_parms));
^~~~~~
net/decnet/dn_dev.c:1176:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(ifa->ifa_label, dev->name);
^~~~~~
net/decnet/dn_dev.c:1176:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(ifa->ifa_label, dev->name);
^~~~~~
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
Suppressed 94 warnings (94 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
137 warnings generated.
drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
^~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
^~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
^~~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ndata, 0, sizeof(struct octnic_data_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ndata, 0, sizeof(struct octnic_data_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(g->sg, 0, g->sg_size);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(g->sg, 0, g->sg_size);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ivi, 0, sizeof(struct ifla_vf_info));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ivi, 0, sizeof(struct ifla_vf_info));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
--
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
if (hw->shutting_down) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
if (hw->shutting_down) {
^
drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
if (hw->to_setup == 1) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
if (hw->to_setup == 1) {
^
drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
again |= get_packets_from_hw(hw);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true. Entering loop body
while (hw->rx_ready && !hw->blocking_rx) {
^
drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
do_receive_packet(hw);
^~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
if (hw->hw_version == HW_VERSION_1) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
if (hw->hw_version == HW_VERSION_1) {
^
drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
if (len > hw->ll_mtu) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
if (len > hw->ll_mtu) {
^
drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is < 'len'
for (i = 0; i < len; i += 2) {
^~~~~~~
drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is true. Entering loop body
for (i = 0; i < len; i += 2) {
^
drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is >= 'len'
for (i = 0; i < len; i += 2) {
^~~~~~~
drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is false. Execution continues on line 902
for (i = 0; i < len; i += 2) {
^
drivers/tty/ipwireless/hardware.c:904:2: note: Calling 'swap_packet_bitfield_from_le'
swap_packet_bitfield_from_le(pkt);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:904:2: note: Returning from 'swap_packet_bitfield_from_le'
swap_packet_bitfield_from_le(pkt);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:906:6: note: Assuming 'ipwireless_debug' is not equal to 0
if (ipwireless_debug)
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:906:2: note: Taking true branch
if (ipwireless_debug)
^
drivers/tty/ipwireless/hardware.c:907:3: note: Calling 'dump_data_bytes'
dump_data_bytes("recv", pkt, len);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:369:10: note: Calling 'data_type'
type, data_type(data, length));
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:347:6: note: 'length' is not equal to 0
if (length == 0)
^~~~~~
drivers/tty/ipwireless/hardware.c:347:2: note: Taking false branch
if (length == 0)
^
drivers/tty/ipwireless/hardware.c:350:23: note: The left operand of '&' is a garbage value
if (hdr->packet_rank & NL_FIRST_PACKET) {
~~~~~~~~~~~~~~~~ ^
>> drivers/tty/ipwireless/hardware.c:368:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
^~~~~~~
drivers/tty/ipwireless/hardware.c:368:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
^~~~~~~
drivers/tty/ipwireless/hardware.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt.rawpkt + header_size,
^~~~~~
drivers/tty/ipwireless/hardware.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt.rawpkt + header_size,
^~~~~~
drivers/tty/ipwireless/hardware.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(packet, old_packet,
^~~~~~
drivers/tty/ipwireless/hardware.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(packet, old_packet,
^~~~~~
drivers/tty/ipwireless/hardware.c:657:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((unsigned char *)(*assem) +
^~~~~~
drivers/tty/ipwireless/hardware.c:657:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((unsigned char *)(*assem) +
^~~~~~
drivers/tty/ipwireless/hardware.c:679:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
^~~~~~
drivers/tty/ipwireless/hardware.c:679:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
^~~~~~
drivers/tty/ipwireless/hardware.c:815:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
unsigned int protocol = packet->hdr.protocol;
^
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
if (hw->shutting_down) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
if (hw->shutting_down) {
^
drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
if (hw->to_setup == 1) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
if (hw->to_setup == 1) {
^
drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
again |= get_packets_from_hw(hw);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true. Entering loop body
while (hw->rx_ready && !hw->blocking_rx) {
^
drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
do_receive_packet(hw);
^~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
if (hw->hw_version == HW_VERSION_1) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
if (hw->hw_version == HW_VERSION_1) {
^
drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
if (len > hw->ll_mtu) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
--
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:482:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vf_rep->stats, &stats, sizeof(stats));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:482:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vf_rep->stats, &stats, sizeof(stats));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:519:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vf_rep, 0, sizeof(*vf_rep));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:519:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vf_rep, 0, sizeof(*vf_rep));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rep_cfg, 0, sizeof(rep_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rep_cfg, 0, sizeof(rep_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:641:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(rep_cfg.rep_name.name, ndev->name, LIO_IF_NAME_SIZE);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:641:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(rep_cfg.rep_name.name, ndev->name, LIO_IF_NAME_SIZE);
^~~~~~~
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
drivers/media/dvb-frontends/cxd2880/cxd2880_devio_spi.c:95:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&send_data[3], write_data_top, send_data[2]);
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_devio_spi.c:95:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&send_data[3], write_data_top, send_data[2]);
^~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/media/dvb-frontends/cxd2880/cxd2880_spi_device.c:27:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tx, 0, sizeof(tx));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_spi_device.c:27:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tx, 0, sizeof(tx));
^~~~~~
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1245:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x01, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1245:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x01, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1247:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1247:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1558:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1558:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1691:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1691:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x00, sizeof(data));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1924:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tnr_dmd, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1924:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tnr_dmd, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1958:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tnr_dmd_main, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1958:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tnr_dmd_main, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1959:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tnr_dmd_sub, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1959:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tnr_dmd_sub, 0, sizeof(struct cxd2880_tnrdmd));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
107 warnings generated.
>> drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->bus_info, "%s", pdev->name);
^~~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->bus_info, "%s", pdev->name);
^~~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
^~~~~~
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
110 warnings generated.
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
offset = CLE_PORT_OFFSET;
^
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: note: Value stored to 'offset' is never read
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&kn, 0, sizeof(kn));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&kn, 0, sizeof(kn));
^~~~~~
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
95 warnings generated.
Suppressed 95 warnings (95 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
net/bridge/br_device.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
^~~~~~
net/bridge/br_device.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
^~~~~~
Suppressed 95 warnings (95 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
100 warnings generated.
net/bridge/br_fdb.c:217:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
^~~~~~
net/bridge/br_fdb.c:217:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
^~~~~~
net/bridge/br_fdb.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
^~~~~~
net/bridge/br_fdb.c:647:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
^~~~~~
net/bridge/br_fdb.c:647:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
^~~~~~
net/bridge/br_fdb.c:667:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
^~~~~~~
drivers/misc/cardreader/rtsx_pcr.c:267:3: note: Taking true branch
if (err < 0)
^
drivers/misc/cardreader/rtsx_pcr.c:268:4: note: Returning without writing to '*val'
return err;
^
drivers/misc/cardreader/rtsx_pcr.c:294:9: note: Returning from '__rtsx_pci_read_phy_register'
return __rtsx_pci_read_phy_register(pcr, addr, val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cardreader/rtsx_pcr.c:294:2: note: Returning without writing to '*'
return __rtsx_pci_read_phy_register(pcr, addr, val);
^
drivers/misc/cardreader/rtsx_pcr.c:1253:3: note: Returning from 'rtsx_pci_read_phy_register'
rtsx_pci_read_phy_register(pcr, 0x01, &val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cardreader/rtsx_pcr.c:1254:7: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
val &= ~(1<<9);
~~~ ^
drivers/misc/cardreader/rtsx_pcr.c:1305:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = rtsx_pci_write_register(pcr, RTS5261_FW_CFG1,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cardreader/rtsx_pcr.c:1305:3: note: Value stored to 'err' is never read
err = rtsx_pci_write_register(pcr, RTS5261_FW_CFG1,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&status, 0, sizeof(struct dpu_danger_safe_status));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&status, 0, sizeof(struct dpu_danger_safe_status));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/hwmon/scpi-hwmon.c:109:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n", (s64)value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:109:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld\n", (s64)value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:111:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:111:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", value);
^~~~~~~
>> drivers/hwmon/scpi-hwmon.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sensor->info.name);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sensor->info.name);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:190:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:190:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:192:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:192:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:197:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:197:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:199:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:199:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:204:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:204:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:206:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:206:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:211:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:211:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:213:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:213:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:218:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:218:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:220:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:220:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
108 warnings generated.
Suppressed 108 warnings (108 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
120 warnings generated.
net/ipv4/ip_tunnel.c:249:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(name, ops->kind);
^~~~~~
net/ipv4/ip_tunnel.c:249:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(name, ops->kind);
^~~~~~
net/ipv4/ip_tunnel.c:250:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(name, "%d");
^~~~~~
net/ipv4/ip_tunnel.c:250:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(name, "%d");
^~~~~~
net/ipv4/ip_tunnel.c:466:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&t->encap, 0, sizeof(t->encap));
^~~~~~
net/ipv4/ip_tunnel.c:466:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&t->encap, 0, sizeof(t->encap));
^~~~~~
net/ipv4/ip_tunnel.c:562:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
^~~~~~
net/ipv4/ip_tunnel.c:562:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
^~~~~~
net/ipv4/ip_tunnel.c:655:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
^~~~~~
net/ipv4/ip_tunnel.c:655:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
--
^~~~~~
drivers/message/fusion/mptbase.c:5885:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:5886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:5886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:5931:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5931:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5933:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5933:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5934:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address,
^~~~~~
drivers/message/fusion/mptbase.c:5934:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address,
^~~~~~
drivers/message/fusion/mptbase.c:5937:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&phys_disk->Path[i].OwnerWWID,
^~~~~~
drivers/message/fusion/mptbase.c:5937:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&phys_disk->Path[i].OwnerWWID,
^~~~~~
drivers/message/fusion/mptbase.c:6082:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mem, (u8 *)pIoc3, iocpage3sz);
^~~~~~
drivers/message/fusion/mptbase.c:6082:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mem, (u8 *)pIoc3, iocpage3sz);
^~~~~~
drivers/message/fusion/mptbase.c:6243:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:6243:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:6244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:6244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:6269:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
^~~~~~
drivers/message/fusion/mptbase.c:6269:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
^~~~~~
drivers/message/fusion/mptbase.c:6270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
^~~~~~
drivers/message/fusion/mptbase.c:6270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
^~~~~~
drivers/message/fusion/mptbase.c:6271:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
^~~~~~
drivers/message/fusion/mptbase.c:6271:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
^~~~~~
drivers/message/fusion/mptbase.c:6293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&evn, 0, sizeof(EventNotification_t));
^~~~~~
drivers/message/fusion/mptbase.c:6293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&evn, 0, sizeof(EventNotification_t));
^~~~~~
drivers/message/fusion/mptbase.c:6294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
^~~~~~
drivers/message/fusion/mptbase.c:6294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
^~~~~~
drivers/message/fusion/mptbase.c:6396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
^~~~~~
drivers/message/fusion/mptbase.c:6396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
^~~~~~
drivers/message/fusion/mptbase.c:6787:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, " (Exp %02d%02d)",
^~~~~~~
drivers/message/fusion/mptbase.c:6787:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, " (Exp %02d%02d)",
^~~~~~~
drivers/message/fusion/mptbase.c:6793:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, " [MDBG]");
^~~~~~
drivers/message/fusion/mptbase.c:6793:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, " [MDBG]");
^~~~~~
>> drivers/message/fusion/mptbase.c:6820:6: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
^~~~~~~
drivers/message/fusion/mptbase.c:6820:6: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
^~~~~~~
drivers/message/fusion/mptbase.c:6831:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
^~~~~~~
drivers/message/fusion/mptbase.c:6831:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
^~~~~~~
drivers/message/fusion/mptbase.c:6834:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
^~~~~~~
drivers/message/fusion/mptbase.c:6834:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
^~~~~~~
drivers/message/fusion/mptbase.c:6837:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, " (disabled)");
^~~~~~~
drivers/message/fusion/mptbase.c:6837:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, " (disabled)");
^~~~~~~
drivers/message/fusion/mptbase.c:6839:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, "\n");
^~~~~~~
drivers/message/fusion/mptbase.c:6839:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, "\n");
^~~~~~~
drivers/message/fusion/mptbase.c:7025:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7025:2: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7174:3: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7174:3: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7197:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7197:2: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7787:8: warning: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii' [clang-analyzer-deadcode.DeadStores]
if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptbase.c:7787:8: note: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii'
if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptbase.c:8175:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(extend_desc, EVENT_DESCR_STR_SZ,
^~~~~~~~
drivers/message/fusion/mptbase.c:8175:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(extend_desc, EVENT_DESCR_STR_SZ,
^~~~~~~~
Suppressed 56 warnings (50 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/media/rc/rc-main.c:292:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(newscan, rc_map->scan, rc_map->len * sizeof(struct rc_map_table));
^~~~~~
drivers/media/rc/rc-main.c:292:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(newscan, rc_map->scan, rc_map->len * sizeof(struct rc_map_table));
^~~~~~
drivers/media/rc/rc-main.c:326:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&rc_map->scan[index], &rc_map->scan[index+ 1],
^~~~~~~
drivers/media/rc/rc-main.c:326:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&rc_map->scan[index], &rc_map->scan[index+ 1],
^~~~~~~
drivers/media/rc/rc-main.c:389:32: warning: The left operand of '==' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (rc_map->scan[i].scancode == scancode)
^
drivers/media/rc/rc-main.c:1999:6: note: Assuming 'dr' is non-null
if (!dr)
^~~
drivers/media/rc/rc-main.c:1999:2: note: Taking false branch
if (!dr)
^
drivers/media/rc/rc-main.c:2002:8: note: Calling 'rc_register_device'
ret = rc_register_device(dev);
--
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1536:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&vram_paddrs, 0, sizeof(vram_paddrs));
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1536:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&vram_paddrs, 0, sizeof(vram_paddrs));
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1554:3: warning: Value stored to 'rg' is never read [clang-analyzer-deadcode.DeadStores]
rg = ofbi->region;
^ ~~~~~~~~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1554:3: note: Value stored to 'rg' is never read
rg = ofbi->region;
^ ~~~~~~~~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1634:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_var, &fbi->var, sizeof(new_var));
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1634:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_var, &fbi->var, sizeof(new_var));
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1638:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&fbi->var, &new_var, sizeof(fbi->var));
^~~~~~
drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1638:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&fbi->var, &new_var, sizeof(fbi->var));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
drivers/net/phy/nxp-c45-tja11xx.c:438:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/phy/nxp-c45-tja11xx.c:438:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/phy/nxp-c45-tja11xx.c:845:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data + i * ETH_GSTRING_LEN,
^~~~~~~
drivers/net/phy/nxp-c45-tja11xx.c:845:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data + i * ETH_GSTRING_LEN,
^~~~~~~
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
drivers/net/phy/nxp-tja11xx.c:365:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data + i * ETH_GSTRING_LEN,
^~~~~~~
drivers/net/phy/nxp-tja11xx.c:365:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data + i * ETH_GSTRING_LEN,
^~~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
181 warnings generated.
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf((char *)bytes,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf((char *)bytes,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_priv_flags_strings[i]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_priv_flags_strings[i]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_vf_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_vf_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(resp, 0, sizeof(struct oct_intrmod_resp));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(resp, 0, sizeof(struct oct_intrmod_resp));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: note: Value stored to 'ret' is never read
ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
--
^
drivers/net/ethernet/agere/et131x.c:3941:6: note: Assuming 'rc' is >= 0
if (rc < 0)
^~~~~~
drivers/net/ethernet/agere/et131x.c:3941:2: note: Taking false branch
if (rc < 0)
^
drivers/net/ethernet/agere/et131x.c:3946:6: note: Assuming field 'regs' is non-null
if (!adapter->regs) {
^~~~~~~~~~~~~~
drivers/net/ethernet/agere/et131x.c:3946:2: note: Taking false branch
if (!adapter->regs) {
^
drivers/net/ethernet/agere/et131x.c:3958:7: note: Calling 'et131x_adapter_memory_alloc'
rc = et131x_adapter_memory_alloc(adapter);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/agere/et131x.c:3125:6: note: 'status' is 0
if (status) {
^~~~~~
drivers/net/ethernet/agere/et131x.c:3125:2: note: Taking false branch
if (status) {
^
drivers/net/ethernet/agere/et131x.c:3133:6: note: 'status' is -12
if (status) {
^~~~~~
drivers/net/ethernet/agere/et131x.c:3133:2: note: Taking true branch
if (status) {
^
drivers/net/ethernet/agere/et131x.c:3134:3: note: Loop condition is false. Exiting loop
dev_err(&adapter->pdev->dev,
^
include/linux/dev_printk.h:144:2: note: expanded from macro 'dev_err'
dev_printk_index_wrap(_dev_err, KERN_ERR, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/net/ethernet/agere/et131x.c:3136:3: note: Calling 'et131x_adapter_memory_free'
et131x_adapter_memory_free(adapter);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/agere/et131x.c:3117:2: note: Calling 'et131x_rx_dma_memory_free'
et131x_rx_dma_memory_free(adapter);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/agere/et131x.c:2013:10: note: Assuming field 'num_ready_recv' is equal to field 'num_rfd'
WARN_ON(rx_ring->num_ready_recv != rx_ring->num_rfd);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/net/ethernet/agere/et131x.c:2015:2: note: Loop condition is true. Entering loop body
while (!list_empty(&rx_ring->recv_list)) {
^
drivers/net/ethernet/agere/et131x.c:2021:3: note: Memory is released
kfree(rfd);
^~~~~~~~~~
drivers/net/ethernet/agere/et131x.c:2015:2: note: Loop condition is true. Entering loop body
while (!list_empty(&rx_ring->recv_list)) {
^
drivers/net/ethernet/agere/et131x.c:2019:3: note: Calling 'list_del'
list_del(&rfd->list_node);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:149:14: note: Use of memory after it is freed
entry->next = LIST_POISON1;
~~~~~~~~~~~ ^
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
164 warnings generated.
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(content, ' ', len);
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(content, ' ', len);
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(pos, result[i], strlen(result[i]));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(pos, result[i], strlen(result[i]));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(pos, items[i].name, strlen(items[i].name));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(pos, items[i].name, strlen(items[i].name));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%d", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%d", i);
^~~~~~~
>> drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s", dim_state_str[dim->state]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s", dim_state_str[dim->state]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->profile_ix);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->profile_ix);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s",
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s",
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->steps_left);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->steps_left);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->steps_right);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->steps_right);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->tired);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->tired);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", coal->int_gl);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", coal->int_gl);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", coal->int_ql);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", coal->int_ql);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "NA");
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "NA");
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%8u", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%8u", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%9u", ring->tx_copybreak);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%9u", ring->tx_copybreak);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->len);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->len);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->next_to_use);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->next_to_use);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->next_to_clean);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->next_to_clean);
--
^~~~~~~
net/ipv4/devinet.c:1498:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(ifa->ifa_label, dot);
^~~~~~
net/ipv4/devinet.c:1498:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(ifa->ifa_label, dot);
^~~~~~
net/ipv4/devinet.c:1500:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
^~~~~~
net/ipv4/devinet.c:1500:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
^~~~~~
net/ipv4/devinet.c:1542:5: warning: Value stored to 'in_dev' is never read [clang-analyzer-deadcode.DeadStores]
in_dev = inetdev_init(dev);
^ ~~~~~~~~~~~~~~~~~
net/ipv4/devinet.c:1542:5: note: Value stored to 'in_dev' is never read
in_dev = inetdev_init(dev);
^ ~~~~~~~~~~~~~~~~~
net/ipv4/devinet.c:1567:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/ipv4/devinet.c:1567:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
^~~~~~
net/ipv4/devinet.c:2683:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all, current->nsproxy->net_ns->ipv4.devconf_all,
^~~~~~
net/ipv4/devinet.c:2683:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all, current->nsproxy->net_ns->ipv4.devconf_all,
^~~~~~
net/ipv4/devinet.c:2685:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dflt,
^~~~~~
net/ipv4/devinet.c:2685:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dflt,
^~~~~~
net/ipv4/devinet.c:2691:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(all, init_net.ipv4.devconf_all,
^~~~~~
net/ipv4/devinet.c:2691:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(all, init_net.ipv4.devconf_all,
^~~~~~
net/ipv4/devinet.c:2693:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dflt, init_net.ipv4.devconf_dflt,
^~~~~~
net/ipv4/devinet.c:2693:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dflt, init_net.ipv4.devconf_dflt,
^~~~~~
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/hwmon/mc13783-adc.c:37:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", priv->name);
^~~~~~~
drivers/hwmon/mc13783-adc.c:37:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", priv->name);
^~~~~~~
drivers/hwmon/mc13783-adc.c:87:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:87:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:106:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:106:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:128:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:128:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", val);
^~~~~~~
drivers/hwmon/mc13783-adc.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/hwmon/mc13783-adc.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/hwmon/mc13783-adc.c:239:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(priv->name, ARRAY_SIZE(priv->name), "%s", id->name);
^~~~~~~~
drivers/hwmon/mc13783-adc.c:239:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(priv->name, ARRAY_SIZE(priv->name), "%s", id->name);
^~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/md/dm-log-userspace-base.c:148:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
^~~~~~~
drivers/md/dm-log-userspace-base.c:148:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
^~~~~~~
>> drivers/md/dm-log-userspace-base.c:150:15: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str_size += sprintf(str + str_size, " %s", argv[i]);
^~~~~~~
drivers/md/dm-log-userspace-base.c:150:15: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str_size += sprintf(str + str_size, " %s", argv[i]);
^~~~~~~
drivers/md/dm-log-userspace-base.c:226:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(lc->uuid, argv[0], DM_UUID_LEN);
^~~~~~~
drivers/md/dm-log-userspace-base.c:226:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(lc->uuid, argv[0], DM_UUID_LEN);
^~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
88 warnings generated.
drivers/md/dm-log-userspace-transfer.c:61:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg, 0, sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:61:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg, 0, sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:119:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkg->data, tfr->data, tfr->data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:119:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkg->data, tfr->data, tfr->data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:201:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tfr->uuid, uuid, DM_UUID_LEN);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:201:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tfr->uuid, uuid, DM_UUID_LEN);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:215:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tfr->data, data, data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:215:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tfr->data, data, data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:217:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pkg, 0, sizeof(pkg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:217:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pkg, 0, sizeof(pkg));
^~~~~~
Suppressed 82 warnings (82 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
143 warnings generated.
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:660:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, ETH_GSTRING_LEN, "%s", strs[i].desc);
^~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:660:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, ETH_GSTRING_LEN, "%s", strs[i].desc);
^~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:771:3: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p = hclge_comm_tqps_get_strings(handle, p);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:771:3: note: Value stored to 'p' is never read
p = hclge_comm_tqps_get_strings(handle, p);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:774:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_APP],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:774:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_APP],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:779:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_SERIAL_SERDES],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:779:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_SERIAL_SERDES],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:784:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p,
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:784:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p,
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:790:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_PHY],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:790:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_PHY],
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:792:4: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p += ETH_GSTRING_LEN;
^
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:792:4: note: Value stored to 'p' is never read
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:805:2: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
p = hclge_comm_tqps_get_stats(handle, p);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:805:2: note: Value stored to 'p' is never read
p = hclge_comm_tqps_get_stats(handle, p);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:3575:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
^~~~~~
drivers/net/ethernet/marvell/sky2.c:1352:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sky2->rx_le, 0, RX_LE_BYTES);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3392:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3392:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3497:9: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
imask |= portirq_msk[i];
^
drivers/net/ethernet/marvell/sky2.c:3517:2: note: Calling 'sky2_all_up'
sky2_all_up(hw);
^~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3488:29: note: The value 2 is assigned to 'i'
for (i = 0; i < hw->ports; i++) {
^~~
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3497:9: note: Assigned value is garbage or undefined
imask |= portirq_msk[i];
^ ~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3804:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + i * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3804:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + i * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3855:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(filter, 0, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3855:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(filter, 0, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3863:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(filter, 0xff, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3863:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(filter, 0xff, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4256:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, 128);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4256:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, 128);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4681:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4681:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4772:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4772:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4774:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sz, "(chip %#x)", chipid);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4774:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sz, "(chip %#x)", chipid);
^~~~~~~~
>> drivers/net/ethernet/marvell/sky2.c:4896:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
^~~~~~~
drivers/net/ethernet/marvell/sky2.c:4896:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
^~~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Assuming the condition is false
if (ering->rx_pending > RX_MAX_PENDING ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
drivers/net/ethernet/marvell/sky2.c:4173:6: note: Assuming field 'rx_pending' is >= 8
ering->rx_pending < 8 ||
^~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4174:6: note: Assuming the condition is false
ering->tx_pending < TX_MIN_PENDING ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4175:6: note: Assuming field 'tx_pending' is <= TX_MAX_PENDING
ering->tx_pending > TX_MAX_PENDING)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:2: note: Taking false branch
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4182:23: note: Calling 'roundup_ring_size'
sky2->tx_ring_size = roundup_ring_size(sky2->tx_pending);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4148:20: note: '?' condition is false
return max(128ul, roundup_pow_of_two(pending+1));
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
drivers/net/ethernet/marvell/sky2.c:4148:20: note: Calling '__roundup_pow_of_two'
return max(128ul, roundup_pow_of_two(pending+1));
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^
include/linux/minmax.h:52:36: note: expanded from macro 'max'
#define max(x, y) __careful_cmp(x, y, >)
~~~~~~~~~~~~~~~~~^~~~~
include/linux/minmax.h:38:17: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:32:25: note: expanded from macro '__cmp_once'
typeof(y) unique_y = (y); \
^
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking false branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:156:9: note: Calling 'fls64'
return fls64(l);
^~~~~~~~
include/asm-generic/bitops/fls64.h:29:6: note: 'x' is not equal to 0
if (x == 0)
^
include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
if (x == 0)
^
include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
return __fls(x) + 1;
^~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:156:9: note: Returning from 'fls64'
return fls64(l);
^~~~~~~~
include/linux/bitops.h:156:2: note: Returning the value 64
return fls64(l);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/hwmon/adc128d818.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/adc128d818.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/adc128d818.c:199:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp * 500);/* 0.5 degrees C resolution */
^~~~~~~
drivers/hwmon/adc128d818.c:199:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp * 500);/* 0.5 degrees C resolution */
^~~~~~~
drivers/hwmon/adc128d818.c:218:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
--
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/comedi/drivers/mite.c:686:13: warning: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'desc') [clang-analyzer-core.NullDereference]
desc->next = cpu_to_le32(ring->dma_addr);
^
drivers/comedi/drivers/mite.c:724:6: note: Assuming field 'prealloc_bufsz' is not equal to 0
if (async->prealloc_bufsz == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:724:2: note: Taking false branch
if (async->prealloc_bufsz == 0)
^
drivers/comedi/drivers/mite.c:732:6: note: Assuming 'descs' is non-null
if (!descs) {
^~~~~~
drivers/comedi/drivers/mite.c:732:2: note: Taking false branch
if (!descs) {
^
drivers/comedi/drivers/mite.c:740:9: note: Calling 'mite_init_ring_descriptors'
return mite_init_ring_descriptors(ring, s, n_links << PAGE_SHIFT);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:654:2: note: 'desc' initialized to a null pointer value
struct mite_dma_desc *desc = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:659:2: note: Taking false branch
dev_dbg(s->device->class_dev,
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/comedi/drivers/mite.c:662:23: note: Assuming 'remainder' is <= 0
if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
^~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:662:23: note: '?' condition is false
drivers/comedi/drivers/mite.c:662:6: note: Assuming the condition is false
if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:662:2: note: Taking false branch
if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
^
drivers/comedi/drivers/mite.c:669:14: note: Assuming 'i' is >= 'n_full_links'
for (i = 0; i < n_full_links; ++i) {
^~~~~~~~~~~~~~~~
drivers/comedi/drivers/mite.c:669:2: note: Loop condition is false. Execution continues on line 678
for (i = 0; i < n_full_links; ++i) {
^
drivers/comedi/drivers/mite.c:678:6: note: 'remainder' is <= 0
if (remainder > 0) {
^~~~~~~~~
drivers/comedi/drivers/mite.c:678:2: note: Taking false branch
if (remainder > 0) {
^
drivers/comedi/drivers/mite.c:686:13: note: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'desc')
desc->next = cpu_to_le32(ring->dma_addr);
~~~~ ^
drivers/comedi/drivers/mite.c:841:3: warning: Value stored to 'wpdep' is never read [clang-analyzer-deadcode.DeadStores]
wpdep = BIT(wpdep);
^
drivers/comedi/drivers/mite.c:841:3: note: Value stored to 'wpdep' is never read
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/extcon/extcon-rt8973a.c:25:8: warning: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal).
Optimal fields order:
name,
irq,
virq,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct muic_irq {
~~~~~~~^~~~~~~~~~
drivers/extcon/extcon-rt8973a.c:25:8: note: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). Optimal fields order: name, irq, virq, consider reordering the fields or adding explicit padding members
struct muic_irq {
~~~~~~~^~~~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/vme/bridges/vme_tsi148.c:739:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:739:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
>> drivers/vme/bridges/vme_tsi148.c:754:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
^~~~~~~
drivers/vme/bridges/vme_tsi148.c:754:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
^~~~~~~
drivers/vme/bridges/vme_tsi148.c:786:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:786:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:1217:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1217:4: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1237:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1237:3: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1302:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1302:4: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1322:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1322:3: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&entry->descriptor, 0, sizeof(entry->descriptor));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:1652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&entry->descriptor, 0, sizeof(entry->descriptor));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2338:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(tsi148_bridge->name, driver_name);
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2338:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(tsi148_bridge->name, driver_name);
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2367:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tsi148_device->flush_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2367:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tsi148_device->flush_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2391:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&master_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2391:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&master_image->bus_resource, 0,
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
119 warnings generated.
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:69:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bridged_mode);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:69:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bridged_mode);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:92:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(adapter->flags & QLCNIC_DIAG_ENABLED));
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:92:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(adapter->flags & QLCNIC_DIAG_ENABLED));
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:167:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&beacon, buf, sizeof(u16));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:167:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&beacon, buf, sizeof(u16));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:242:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", adapter->ahw->beacon_state);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:242:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", adapter->ahw->beacon_state);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:329:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &data, size);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:329:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &data, size);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:349:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data, buf, size);
--
39 warnings generated.
drivers/hwmon/pc87427.c:393:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", fan_from_reg(data->fan[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:393:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", fan_from_reg(data->fan[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:402:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", fan_from_reg(data->fan_min[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:402:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", fan_from_reg(data->fan_min[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:411:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->fan_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:411:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->fan_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:421:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->fan_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:421:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->fan_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:574:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pwm_enable);
^~~~~~~
drivers/hwmon/pc87427.c:574:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pwm_enable);
^~~~~~~
drivers/hwmon/pc87427.c:605:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", (int)data->pwm[nr]);
^~~~~~~
drivers/hwmon/pc87427.c:605:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", (int)data->pwm[nr]);
^~~~~~~
drivers/hwmon/pc87427.c:697:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", temp_from_reg(data->temp[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:697:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", temp_from_reg(data->temp[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:706:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_min[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:706:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_min[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:715:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_max[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:715:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_max[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:724:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_crit[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:724:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_crit[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:733:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", temp_type_from_reg(data->temp_type[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:733:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", temp_type_from_reg(data->temp_type[nr]));
^~~~~~~
drivers/hwmon/pc87427.c:743:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:743:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:754:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:754:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:765:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:765:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:775:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:775:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(data->temp_status[nr]
^~~~~~~
drivers/hwmon/pc87427.c:926:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/pc87427.c:926:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(name, "qcom,hdmi-tx-%s", name3))
^~~~~~
drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(name, "qcom,hdmi-tx-%s", name3))
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
^~~~~~~~
drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
^~~~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
drivers/platform/mellanox/mlxreg-io.c:124:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", regval);
^~~~~~~
drivers/platform/mellanox/mlxreg-io.c:124:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", regval);
^~~~~~~
drivers/platform/mellanox/mlxreg-io.c:183:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->mlxreg_io_dev_attr[i].dev_attr,
^~~~~~
drivers/platform/mellanox/mlxreg-io.c:183:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->mlxreg_io_dev_attr[i].dev_attr,
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
drivers/mailbox/bcm-pdc-mailbox.c:497:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(spu_stats_name, 16, "pdc%d_stats", pdcs->pdc_idx);
^~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:497:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(spu_stats_name, 16, "pdc%d_stats", pdcs->pdc_idx);
^~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:523:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:523:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:551:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:551:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:989:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:989:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &pdcs->pdev->dev;
^~~ ~~~~~~~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1012:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pdcs->tx_ring_alloc, &tx, sizeof(tx));
^~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1012:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&pdcs->tx_ring_alloc, &tx, sizeof(tx));
^~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1013:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pdcs->rx_ring_alloc, &rx, sizeof(rx));
^~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1013:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&pdcs->rx_ring_alloc, &rx, sizeof(rx));
^~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1287:2: warning: Value stored to 'dev' is never read [clang-analyzer-deadcode.DeadStores]
dev = &pdev->dev;
^ ~~~~~~~~~~
drivers/mailbox/bcm-pdc-mailbox.c:1287:2: note: Value stored to 'dev' is never read
dev = &pdev->dev;
^ ~~~~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^
drivers/atm/iphase.c:1876:13: note: Assuming field 'traffic_class' is equal to ATM_CBR
} else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:1876:9: note: Taking true branch
} else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
^
drivers/atm/iphase.c:1877:17: note: Taking false branch
if (iadev->phy_type & FE_25MBIT_PHY) {
^
drivers/atm/iphase.c:1881:21: note: Assuming field 'max_pcr' is <= field 'LineRate'
if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:1881:17: note: Taking false branch
if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
^
drivers/atm/iphase.c:1887:28: note: Calling 'ia_cbr_setup'
if ((ret = ia_cbr_setup (iadev, vcc)) < 0) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:474:8: note: Assuming field 'max_pcr' is > 0
if (vcc->qos.txtp.max_pcr <= 0) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:474:4: note: Taking false branch
if (vcc->qos.txtp.max_pcr <= 0) {
^
drivers/atm/iphase.c:479:4: note: Value assigned to 'entries'
entries = rate / dev->Granularity;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:480:4: note: Assuming the condition is false
IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:480:4: note: Taking false branch
IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:482:8: note: Assuming 'entries' is < 1
if (entries < 1)
^~~~~~~~~~~
drivers/atm/iphase.c:482:4: note: Taking true branch
if (entries < 1)
^
drivers/atm/iphase.c:483:7: note: Taking false branch
IF_CBR(printk("CBR: Bandwidth smaller than granularity of CBR table\n");)
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:486:8: note: Assuming the condition is false
if (3*(rate - rateLow) > (rateHigh - rate))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:486:4: note: Taking false branch
if (3*(rate - rateLow) > (rateHigh - rate))
^
drivers/atm/iphase.c:488:8: note: 'entries' is <= field 'CbrRemEntries'
if (entries > dev->CbrRemEntries) {
^~~~~~~
drivers/atm/iphase.c:488:4: note: Taking false branch
if (entries > dev->CbrRemEntries) {
^
drivers/atm/iphase.c:502:33: note: Division by zero
spacing = dev->CbrTotEntries / entries;
~~~~~~~~~~~~~~~~~~~^~~~~~~~~
drivers/atm/iphase.c:534:7: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:534:7: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:545:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:545:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:559:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:559:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:562:8: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
^~~~~~
drivers/atm/iphase.c:562:8: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
^~~~~~
>> drivers/atm/iphase.c:985:17: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, "%s", prefix );
^~~~~~~
drivers/atm/iphase.c:985:17: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, "%s", prefix );
^~~~~~~
drivers/atm/iphase.c:988:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:988:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:989:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
^~~~~~~
drivers/atm/iphase.c:989:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
^~~~~~~
drivers/atm/iphase.c:993:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:993:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:994:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:994:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:996:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:996:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:1001:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf(pBuf, "%c", c);
^~~~~~~
drivers/atm/iphase.c:1001:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf(pBuf, "%c", c);
^~~~~~~
drivers/atm/iphase.c:1003:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf(pBuf, ".");
^~~~~~~
drivers/atm/iphase.c:1003:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf(pBuf, ".");
^~~~~~~
drivers/atm/iphase.c:1396:30: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
*vc_table = vcc->vci << 6;
^
drivers/atm/iphase.c:2696:6: note: Assuming the condition is false
if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2696:2: note: Taking false branch
if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))
^
drivers/atm/iphase.c:2701:6: note: Assuming the condition is false
if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2701:33: note: Left side of '&&' is false
if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)
^
drivers/atm/iphase.c:2706:6: note: Assuming field 'aal' is equal to ATM_AAL5
if (vcc->qos.aal != ATM_AAL5)
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2706:2: note: Taking false branch
if (vcc->qos.aal != ATM_AAL5)
^
drivers/atm/iphase.c:2708:2: note: Assuming the condition is false
IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n",
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2708:2: note: Taking false branch
IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n",
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:2713:6: note: Assuming 'ia_vcc' is non-null
if (!ia_vcc) return -ENOMEM;
^~~~~~~
drivers/atm/iphase.c:2713:2: note: Taking false branch
if (!ia_vcc) return -ENOMEM;
^
drivers/atm/iphase.c:2716:15: note: Calling 'open_rx'
if ((error = open_rx(vcc)))
^~~~~~~~~~~~
drivers/atm/iphase.c:1380:2: note: Assuming the condition is false
IF_EVENT(printk("iadev: open_rx %d.%d\n", vcc->vpi, vcc->vci);)
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
--
^~~~~~
net/xfrm/xfrm_user.c:3214:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
^~~~~~
net/xfrm/xfrm_user.c:3215:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
^~~~~~
net/xfrm/xfrm_user.c:3215:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
^~~~~~
net/xfrm/xfrm_user.c:3409:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(id, 0, sizeof(*id));
^~~~~~
net/xfrm/xfrm_user.c:3409:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(id, 0, sizeof(*id));
^~~~~~
net/xfrm/xfrm_user.c:3414:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&id->sel, &xp->selector, sizeof(id->sel));
^~~~~~
net/xfrm/xfrm_user.c:3414:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&id->sel, &xp->selector, sizeof(id->sel));
^~~~~~
net/xfrm/xfrm_user.c:3510:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ur->sel, sel, sizeof(ur->sel));
^~~~~~
net/xfrm/xfrm_user.c:3510:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ur->sel, sel, sizeof(ur->sel));
^~~~~~
net/xfrm/xfrm_user.c:3556:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
^~~~~~
net/xfrm/xfrm_user.c:3556:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
^~~~~~
net/xfrm/xfrm_user.c:3560:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
^~~~~~
net/xfrm/xfrm_user.c:3560:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
^~~~~~
net/xfrm/xfrm_user.c:3561:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
^~~~~~
net/xfrm/xfrm_user.c:3561:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
^~~~~~
Suppressed 100 warnings (100 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
sound/core/seq/seq_ports.c:136:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:136:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:155:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:155:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:702:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:702:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
sound/spi/at73c213.c:714:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(card->mixername, chip->pcm->name);
^~~~~~
sound/spi/at73c213.c:714:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(card->mixername, chip->pcm->name);
^~~~~~
sound/spi/at73c213.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&chip->reg_image, &snd_at73c213_original_image,
^~~~~~
sound/spi/at73c213.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chip->reg_image, &snd_at73c213_original_image,
^~~~~~
sound/spi/at73c213.c:962:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
^~~~~~~~
sound/spi/at73c213.c:962:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
^~~~~~~~
sound/spi/at73c213.c:985:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(card->shortname, board->shortname);
^~~~~~
sound/spi/at73c213.c:985:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(card->shortname, board->shortname);
^~~~~~
>> sound/spi/at73c213.c:986:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
^~~~~~~
sound/spi/at73c213.c:986:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
82 warnings generated.
net/nfc/nci/data.c:240:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_push(skb, reassembly_len),
^~~~~~
net/nfc/nci/data.c:240:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_push(skb, reassembly_len),
^~~~~~
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
Suppressed 66 warnings (66 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
101 warnings generated.
net/nfc/nci/ntf.c:123:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfca_poll->nfcid1, data, nfca_poll->nfcid1_len);
^~~~~~
net/nfc/nci/ntf.c:123:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfca_poll->nfcid1, data, nfca_poll->nfcid1_len);
^~~~~~
net/nfc/nci/ntf.c:147:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfcb_poll->sensb_res, data, nfcb_poll->sensb_res_len);
^~~~~~
net/nfc/nci/ntf.c:147:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfcb_poll->sensb_res, data, nfcb_poll->sensb_res_len);
^~~~~~
net/nfc/nci/ntf.c:164:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfcf_poll->sensf_res, data, nfcf_poll->sensf_res_len);
^~~~~~
net/nfc/nci/ntf.c:164:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfcf_poll->sensf_res, data, nfcf_poll->sensf_res_len);
^~~~~~
net/nfc/nci/ntf.c:177:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfcv_poll->uid, data, NFC_ISO15693_UID_MAXSIZE);
^~~~~~
net/nfc/nci/ntf.c:177:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfcv_poll->uid, data, NFC_ISO15693_UID_MAXSIZE);
^~~~~~
net/nfc/nci/ntf.c:189:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfcf_listen->local_nfcid2, data, nfcf_listen->local_nfcid2_len);
^~~~~~
net/nfc/nci/ntf.c:189:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfcf_listen->local_nfcid2, data, nfcf_listen->local_nfcid2_len);
^~~~~~
net/nfc/nci/ntf.c:240:20: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
target->sens_res = nfca_poll->sens_res;
^
net/nfc/nci/ntf.c:756:2: note: Taking false branch
pr_debug("NCI RX: MT=ntf, PBF=%d, GID=0x%x, OID=0x%x, plen=%d\n",
^
include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
net/nfc/nci/ntf.c:765:6: note: Assuming the condition is false
if (nci_opcode_gid(ntf_opcode) == NCI_GID_PROPRIETARY) {
^
include/net/nfc/nci.h:184:29: note: expanded from macro 'nci_opcode_gid'
#define nci_opcode_gid(op) (__u8)(((op)&0x0f00)>>8)
^
net/nfc/nci/ntf.c:765:2: note: Taking false branch
if (nci_opcode_gid(ntf_opcode) == NCI_GID_PROPRIETARY) {
^
net/nfc/nci/ntf.c:774:2: note: Control jumps to 'case 259:' at line 791
switch (ntf_opcode) {
^
net/nfc/nci/ntf.c:792:3: note: Calling 'nci_rf_discover_ntf_packet'
nci_rf_discover_ntf_packet(ndev, skb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/nfc/nci/ntf.c:338:2: note: Taking false branch
pr_debug("rf_discovery_id %d\n", ntf.rf_discovery_id);
^
include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
net/nfc/nci/ntf.c:339:2: note: Taking false branch
pr_debug("rf_protocol 0x%x\n", ntf.rf_protocol);
^
include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
net/nfc/nci/ntf.c:340:2: note: Taking false branch
pr_debug("rf_tech_and_mode 0x%x\n", ntf.rf_tech_and_mode);
^
include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
--
^ ~~~~~~~~~
net/sched/sch_ets.c:694:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
^~~~~~
net/sched/sch_ets.c:694:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
^~~~~~
Suppressed 80 warnings (80 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
106 warnings generated.
net/ipv4/ipconfig.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ir, 0, sizeof(ir));
^~~~~~
net/ipv4/ipconfig.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ir, 0, sizeof(ir));
^~~~~~
net/ipv4/ipconfig.c:374:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(ir.ifr_ifrn.ifrn_name, ic_dev->dev->name);
^~~~~~
net/ipv4/ipconfig.c:374:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(ir.ifr_ifrn.ifrn_name, ic_dev->dev->name);
^~~~~~
net/ipv4/ipconfig.c:415:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rm, 0, sizeof(rm));
^~~~~~
net/ipv4/ipconfig.c:415:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rm, 0, sizeof(rm));
^~~~~~
net/ipv4/ipconfig.c:446:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(init_utsname()->nodename, "%pI4", &ic_myaddr);
^~~~~~~
net/ipv4/ipconfig.c:446:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(init_utsname()->nodename, "%pI4", &ic_myaddr);
^~~~~~~
net/ipv4/ipconfig.c:1425:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(name, cp, strlen(cp) + 1);
^~~~~~~
net/ipv4/ipconfig.c:1425:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(name, cp, strlen(cp) + 1);
^~~~~~~
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
126 warnings generated.
drivers/net/ethernet/sun/niu.c:1704:2: warning: Value stored to 'bmcr' is never read [clang-analyzer-deadcode.DeadStores]
bmcr = mii_read(np, np->phy_addr, MII_BMCR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:1704:2: note: Value stored to 'bmcr' is never read
bmcr = mii_read(np, np->phy_addr, MII_BMCR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2215:3: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
niu_link_status_common(np, link_up);
^ ~~~~~~~
drivers/net/ethernet/sun/niu.c:2211:11: note: 'link_up' declared without an initial value
int err, link_up;
^~~~~~~
drivers/net/ethernet/sun/niu.c:2213:8: note: Calling 'niu_link_status'
err = niu_link_status(np, &link_up);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2201:6: note: Assuming field 'link_status' is null
if (ops->link_status)
^~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2201:2: note: Taking false branch
if (ops->link_status)
^
drivers/net/ethernet/sun/niu.c:2204:2: note: Returning without writing to '*link_up_p'
return err;
^
drivers/net/ethernet/sun/niu.c:2204:2: note: Returning zero (loaded from 'err'), which participates in a condition later
return err;
^~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2213:8: note: Returning from 'niu_link_status'
err = niu_link_status(np, &link_up);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2214:7: note: 'err' is 0
if (!err)
^~~
drivers/net/ethernet/sun/niu.c:2214:2: note: Taking true branch
if (!err)
^
drivers/net/ethernet/sun/niu.c:2215:3: note: 2nd function call argument is an uninitialized value
niu_link_status_common(np, link_up);
^ ~~~~~~~
drivers/net/ethernet/sun/niu.c:3149:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ent, 0, sizeof(ent));
^~~~~~
drivers/net/ethernet/sun/niu.c:3149:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ent, 0, sizeof(ent));
^~~~~~
drivers/net/ethernet/sun/niu.c:4636:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:4636:2: note: Value stored to 'val' is never read
val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:5003:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:5003:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tp, 0, sizeof(*tp));
^~~~~~
>> drivers/net/ethernet/sun/niu.c:6008:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6008:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6011:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6011:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6012:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6012:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6018:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[i+j], "%s-rx-%d",
^~~~~~~
drivers/net/ethernet/sun/niu.c:6018:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[i+j], "%s-rx-%d",
^~~~~~~
drivers/net/ethernet/sun/niu.c:6021:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
^~~~~~~
drivers/net/ethernet/sun/niu.c:6021:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
^~~~~~~
drivers/net/ethernet/sun/niu.c:6032:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6032:2: note: Value stored to 'err' is never read
err = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6557:9: warning: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl' [clang-analyzer-deadcode.DeadStores]
ipv6 = ihl = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6557:9: note: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl'
ipv6 = ihl = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6785:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
^~~~~~~~
drivers/net/ethernet/sun/niu.c:6785:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
^~~~~~~~
drivers/net/ethernet/sun/niu.c:6800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/net/ethernet/sun/niu.c:6800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/net/ethernet/sun/niu.c:6882:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, ((char *)&val) + b_offset, b_count);
^~~~~~
drivers/net/ethernet/sun/niu.c:6882:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, ((char *)&val) + b_offset, b_count);
^~~~~~
drivers/net/ethernet/sun/niu.c:6889:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &val, 4);
^~~~~~
drivers/net/ethernet/sun/niu.c:6889:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &val, 4);
^~~~~~
drivers/net/ethernet/sun/niu.c:6896:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &val, len);
^~~~~~
drivers/net/ethernet/sun/niu.c:6896:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &val, len);
^~~~~~
drivers/net/ethernet/sun/niu.c:7501:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:7501:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:7739:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_xmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7739:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_xmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7743:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_bmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7743:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_bmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7748:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_rxchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7748:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_rxchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7753:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_txchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7753:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_txchan_stat_keys,
--
^~~~~~
net/bridge/br_multicast_eht.c:516:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&eht_src_addr, 0, sizeof(eht_src_addr));
^~~~~~
net/bridge/br_multicast_eht.c:518:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:518:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:538:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&eht_src_addr, 0, sizeof(eht_src_addr));
^~~~~~
net/bridge/br_multicast_eht.c:538:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&eht_src_addr, 0, sizeof(eht_src_addr));
^~~~~~
net/bridge/br_multicast_eht.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&src_ip, 0, sizeof(src_ip));
^~~~~~
net/bridge/br_multicast_eht.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&src_ip, 0, sizeof(src_ip));
^~~~~~
net/bridge/br_multicast_eht.c:542:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:542:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:545:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&src_ip, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:545:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&src_ip, srcs + (src_idx * addr_size), addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:618:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&eht_src_addr, 0, sizeof(eht_src_addr));
^~~~~~
net/bridge/br_multicast_eht.c:618:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&eht_src_addr, 0, sizeof(eht_src_addr));
^~~~~~
net/bridge/br_multicast_eht.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&eht_host_addr, 0, sizeof(eht_host_addr));
^~~~~~
net/bridge/br_multicast_eht.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&eht_host_addr, 0, sizeof(eht_host_addr));
^~~~~~
net/bridge/br_multicast_eht.c:792:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&eht_host_addr, h_addr, addr_size);
^~~~~~
net/bridge/br_multicast_eht.c:792:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&eht_host_addr, h_addr, addr_size);
^~~~~~
Suppressed 102 warnings (102 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
drivers/net/ethernet/freescale/fec_ptp.c:104:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val = 0;
^ ~
drivers/net/ethernet/freescale/fec_ptp.c:104:2: note: Value stored to 'val' is never read
val = 0;
^ ~
drivers/net/ethernet/freescale/fec_ptp.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fep->cc, 0, sizeof(fep->cc));
^~~~~~
drivers/net/ethernet/freescale/fec_ptp.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fep->cc, 0, sizeof(fep->cc));
^~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
95 warnings generated.
drivers/net/ethernet/freescale/gianfar.c:1684:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&edata, 0, sizeof(struct ethtool_eee));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1684:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&edata, 0, sizeof(struct ethtool_eee));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1694:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fcb, 0, GMAC_FCB_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1694:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fcb, 0, GMAC_FCB_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1841:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->data, 0, GMAC_TXPAL_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1841:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->data, 0, GMAC_TXPAL_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2210:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2210:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2473:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shhwtstamps, 0, sizeof(*shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2473:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shhwtstamps, 0, sizeof(*shhwtstamps));
^~~~~~
>> drivers/net/ethernet/freescale/gianfar.c:3325:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3325:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3327:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3327:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3329:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3329:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3332:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(gfar_irq(grp, TX)->name, dev->name);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:3332:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(gfar_irq(grp, TX)->name, dev->name);
^~~~~~
Suppressed 86 warnings (86 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
93 warnings generated.
net/ipv6/ip6_flowlabel.c:401:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fl->opt, 0, sizeof(*fl->opt));
^~~~~~
net/ipv6/ip6_flowlabel.c:401:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fl->opt, 0, sizeof(*fl->opt));
^~~~~~
net/ipv6/ip6_flowlabel.c:410:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&flowi6, 0, sizeof(flowi6));
^~~~~~
net/ipv6/ip6_flowlabel.c:410:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&flowi6, 0, sizeof(flowi6));
^~~~~~
Suppressed 91 warnings (91 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
108 warnings generated.
net/ipv6/inet6_connection_sock.c:37:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fl6, 0, sizeof(*fl6));
^~~~~~
net/ipv6/inet6_connection_sock.c:37:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fl6, 0, sizeof(*fl6));
^~~~~~
net/ipv6/inet6_connection_sock.c:87:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fl6, 0, sizeof(*fl6));
^~~~~~
net/ipv6/inet6_connection_sock.c:87:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fl6, 0, sizeof(*fl6));
^~~~~~
Suppressed 106 warnings (106 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
__list_del(entry->prev, entry->next);
^
sound/core/control.c:121:2: note: Loop condition is false. Exiting loop
write_lock_irqsave(&card->ctl_files_rwlock, flags);
^
include/linux/rwlock.h:72:2: note: expanded from macro 'write_lock_irqsave'
do { \
^
sound/core/control.c:123:2: note: Loop condition is false. Exiting loop
write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
^
include/linux/rwlock.h:109:2: note: expanded from macro 'write_unlock_irqrestore'
do { \
^
sound/core/control.c:125:2: note: Loop condition is false. Execution continues on line 129
list_for_each_entry(control, &card->controls, list)
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
sound/core/control.c:130:2: note: Calling 'snd_ctl_empty_read_queue'
snd_ctl_empty_read_queue(ctl);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sound/core/control.c:101:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&ctl->read_lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
sound/core/control.c:101:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&ctl->read_lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
sound/core/control.c:102:2: note: Loop condition is true. Entering loop body
while (!list_empty(&ctl->events)) {
--
88 warnings generated.
Suppressed 88 warnings (88 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
129 warnings generated.
drivers/net/ethernet/intel/igc/igc_main.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ring->rx_buffer_info, 0,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ring->rx_buffer_info, 0,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:878:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:878:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:914:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:914:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:929:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:929:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:954:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:954:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:992:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:992:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:1776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:1776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2899:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2899:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2928:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2928:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2964:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2964:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:3238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&flex->data[offset], src, len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:3238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&flex->data[offset], src, len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4011:3: warning: Value stored to 'current_itr' is never read [clang-analyzer-deadcode.DeadStores]
current_itr = 0;
^ ~
drivers/net/ethernet/intel/igc/igc_main.c:4011:3: note: Value stored to 'current_itr' is never read
current_itr = 0;
^ ~
drivers/net/ethernet/intel/igc/igc_main.c:4168:6: warning: Value stored to 'new_val' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int new_val = q_vector->itr_val;
^~~~~~~ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4168:6: note: Value stored to 'new_val' during its initialization is never read
int new_val = q_vector->itr_val;
^~~~~~~ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4350:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4350:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4928:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stats, &adapter->stats64, sizeof(*stats));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4928:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stats, &adapter->stats64, sizeof(*stats));
^~~~~~
>> drivers/net/ethernet/intel/igc/igc_main.c:5173:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5173:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5176:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-tx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5176:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-tx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5179:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-rx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5179:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-rx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5182:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-unused", netdev->name);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5182:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-unused", netdev->name);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6332:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6332:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(netdev->name, "eth%d", IFNAMSIZ);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(netdev->name, "eth%d", IFNAMSIZ);
^~~~~~~
Suppressed 106 warnings (106 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
85 warnings generated.
Suppressed 85 warnings (85 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
80 warnings generated.
net/batman-adv/routing.c:662:17: warning: Value stored to 'ethhdr' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct ethhdr *ethhdr = eth_hdr(skb);
^~~~~~ ~~~~~~~~~~~~
net/batman-adv/routing.c:662:17: note: Value stored to 'ethhdr' during its initialization is never read
struct ethhdr *ethhdr = eth_hdr(skb);
^~~~~~ ~~~~~~~~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
net/batman-adv/soft-interface.c:209:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->cb, 0, sizeof(struct batadv_skb_cb));
^~~~~~
net/batman-adv/soft-interface.c:209:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->cb, 0, sizeof(struct batadv_skb_cb));
^~~~~~
net/batman-adv/soft-interface.c:950:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, batadv_counters_strings,
^~~~~~
net/batman-adv/soft-interface.c:950:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, batadv_counters_strings,
^~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
84 warnings generated.
net/batman-adv/tp_meter.c:553:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[pos], &batadv_tp_prerandom[local_offset], to_copy);
^~~~~~
net/batman-adv/tp_meter.c:553:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[pos], &batadv_tp_prerandom[local_offset], to_copy);
^~~~~~
net/batman-adv/tp_meter.c:605:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(icmp->session, session, sizeof(icmp->session));
^~~~~~
net/batman-adv/tp_meter.c:605:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(icmp->session, session, sizeof(icmp->session));
^~~~~~
net/batman-adv/tp_meter.c:986:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tp_vars->session, session_id, sizeof(session_id));
^~~~~~
net/batman-adv/tp_meter.c:986:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tp_vars->session, session_id, sizeof(session_id));
^~~~~~
net/batman-adv/tp_meter.c:1193:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(icmp->session, session, sizeof(icmp->session));
^~~~~~
net/batman-adv/tp_meter.c:1193:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(icmp->session, session, sizeof(icmp->session));
^~~~~~
net/batman-adv/tp_meter.c:1352:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tp_vars->session, icmp->session, sizeof(tp_vars->session));
--
drivers/md/dm-writecache.c:2004:5: note: Execution continues on line 1970
continue;
^
drivers/md/dm-writecache.c:1970:9: note: Assuming the condition is true
while (!list_empty(&wc->lru) &&
^~~~~~~~~~~~~~~~~~~~~
drivers/md/dm-writecache.c:1970:9: note: Left side of '&&' is true
drivers/md/dm-writecache.c:1971:10: note: Assuming field 'writeback_all' is not equal to 0
(wc->writeback_all ||
^~~~~~~~~~~~~~~~~
drivers/md/dm-writecache.c:1971:28: note: Left side of '||' is true
(wc->writeback_all ||
^
drivers/md/dm-writecache.c:1977:46: note: Left side of '&&' is false
if (unlikely(n_walked > WRITEBACK_LATENCY) &&
^
drivers/md/dm-writecache.c:1984:20: note: Field 'writeback_all' is not equal to 0
if (unlikely(wc->writeback_all)) {
^
drivers/md/dm-writecache.c:1984:3: note: Taking true branch
if (unlikely(wc->writeback_all)) {
^
drivers/md/dm-writecache.c:1985:18: note: 'e' is non-null
if (unlikely(!e)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/md/dm-writecache.c:1985:4: note: Taking false branch
if (unlikely(!e)) {
^
drivers/md/dm-writecache.c:1989:7: note: Assigned value is garbage or undefined
e = g;
^ ~
drivers/md/dm-writecache.c:2351:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &wc->block_size, &dummy) != 1 ||
^~~~~~
drivers/md/dm-writecache.c:2351:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &wc->block_size, &dummy) != 1 ||
^~~~~~
drivers/md/dm-writecache.c:2382:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%llu%c", &start_sector, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2382:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%llu%c", &start_sector, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2391:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%d%c", &high_wm_percent, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2391:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%d%c", &high_wm_percent, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2399:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%d%c", &low_wm_percent, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2399:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%d%c", &low_wm_percent, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2407:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &wc->max_writeback_jobs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2407:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &wc->max_writeback_jobs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2412:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &wc->autocommit_blocks, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2412:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &wc->autocommit_blocks, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2418:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &autocommit_msecs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2418:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &autocommit_msecs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2428:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &max_age_msecs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2428:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &max_age_msecs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2455:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(string, "%u%c", &pause_msecs, &dummy) != 1)
^~~~~~
drivers/md/dm-writecache.c:2455:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(string, "%u%c", &pause_msecs, &dummy) != 1)
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
^~~~~~~~
drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
^~~~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
>> drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
^~~~~~~
drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
^~~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
113 warnings generated.
drivers/net/ethernet/broadcom/bcmsysport.c:381:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:381:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:387:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "txq%d_packets", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:387:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "txq%d_packets", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:388:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:388:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:392:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "txq%d_bytes", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:392:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "txq%d_bytes", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:393:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:393:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:543:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:543:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:560:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:560:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:903:21: warning: Value stored to 'ndev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *ndev = priv->netdev;
^~~~ ~~~~~~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:903:21: note: Value stored to 'ndev' during its initialization is never read
struct net_device *ndev = priv->netdev;
^~~~ ~~~~~~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tsb, 0, sizeof(*tsb));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tsb, 0, sizeof(*tsb));
^~~~~~
Suppressed 104 warnings (100 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
80 warnings generated.
Suppressed 80 warnings (80 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
102 warnings generated.
net/sched/em_meta.c:933:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&meta->lvalue.hdr, &hdr->left, sizeof(hdr->left));
^~~~~~
net/sched/em_meta.c:933:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&meta->lvalue.hdr, &hdr->left, sizeof(hdr->left));
^~~~~~
net/sched/em_meta.c:934:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&meta->rvalue.hdr, &hdr->right, sizeof(hdr->right));
^~~~~~
net/sched/em_meta.c:934:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&meta->rvalue.hdr, &hdr->right, sizeof(hdr->right));
^~~~~~
net/sched/em_meta.c:968:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0, sizeof(hdr));
^~~~~~
net/sched/em_meta.c:968:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0, sizeof(hdr));
^~~~~~
net/sched/em_meta.c:969:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hdr.left, &meta->lvalue.hdr, sizeof(hdr.left));
^~~~~~
net/sched/em_meta.c:969:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hdr.left, &meta->lvalue.hdr, sizeof(hdr.left));
^~~~~~
net/sched/em_meta.c:970:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hdr.right, &meta->rvalue.hdr, sizeof(hdr.right));
^~~~~~
net/sched/em_meta.c:970:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hdr.right, &meta->rvalue.hdr, sizeof(hdr.right));
^~~~~~
Suppressed 97 warnings (97 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
^~~~~~
net/ipv6/route.c:5434:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&r_cfg, cfg, sizeof(*cfg));
^~~~~~
net/ipv6/route.c:5937:11: warning: Although the value stored to 'count' is used in the enclosing expression, the value is never actually read from 'count' [clang-analyzer-deadcode.DeadStores]
return count += w.count;
^ ~~~~~~~
net/ipv6/route.c:5937:11: note: Although the value stored to 'count' is used in the enclosing expression, the value is never actually read from 'count'
return count += w.count;
^ ~~~~~~~
net/ipv6/route.c:6458:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&net->ipv6.ip6_dst_ops, &ip6_dst_ops_template,
^~~~~~
net/ipv6/route.c:6458:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&net->ipv6.ip6_dst_ops, &ip6_dst_ops_template,
^~~~~~
net/ipv6/route.c:6467:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(net->ipv6.fib6_null_entry, &fib6_null_entry_template,
^~~~~~
net/ipv6/route.c:6467:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(net->ipv6.fib6_null_entry, &fib6_null_entry_template,
^~~~~~
Suppressed 126 warnings (126 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
drivers/net/arcnet/rfc1201.c:195:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt, pkthdr, sizeof(struct archdr));
^~~~~~
drivers/net/arcnet/rfc1201.c:195:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt, pkthdr, sizeof(struct archdr));
^~~~~~
drivers/net/arcnet/rfc1201.c:303:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt, pkthdr, ARC_HDR_SIZE + RFC1201_HDR_SIZE);
^~~~~~
drivers/net/arcnet/rfc1201.c:303:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt, pkthdr, ARC_HDR_SIZE + RFC1201_HDR_SIZE);
^~~~~~
drivers/net/arcnet/rfc1201.c:348:4: warning: Value stored to 'soft' is never read [clang-analyzer-deadcode.DeadStores]
soft = &pkt->soft.rfc1201;
^ ~~~~~~~~~~~~~~~~~~
drivers/net/arcnet/rfc1201.c:348:4: note: Value stored to 'soft' is never read
soft = &pkt->soft.rfc1201;
^ ~~~~~~~~~~~~~~~~~~
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
drivers/net/arcnet/rfc1051.c:147:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt, pkthdr, sizeof(struct archdr));
^~~~~~
drivers/net/arcnet/rfc1051.c:147:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt, pkthdr, sizeof(struct archdr));
^~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
net/batman-adv/distributed-arp-table.c:1611:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, chaddr, BATADV_DHCP_CHADDR_LEN);
^~~~~~
net/batman-adv/distributed-arp-table.c:1611:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, chaddr, BATADV_DHCP_CHADDR_LEN);
^~~~~~
Suppressed 86 warnings (86 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
82 warnings generated.
net/batman-adv/fragmentation.c:280:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
^~~~~~~
net/batman-adv/fragmentation.c:280:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
^~~~~~~
net/batman-adv/fragmentation.c:425:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_fragment->data, frag_head, header_size);
^~~~~~
net/batman-adv/fragmentation.c:425:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_fragment->data, frag_head, header_size);
^~~~~~
net/batman-adv/fragmentation.c:535:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb->data, &frag_header, header_size);
^~~~~~
net/batman-adv/fragmentation.c:535:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb->data, &frag_header, header_size);
^~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
drivers/net/ethernet/mellanox/mlx4/main.c:562:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hca_param, 0, sizeof(hca_param));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:562:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hca_param, 0, sizeof(hca_param));
^~~~~~
>> drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(type, "%s",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(type, "%s",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "auto (%s)\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "auto (%s)\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%s\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%s\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->dev_name, "mlx4_port%d", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->dev_name, "mlx4_port%d", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -ENOMEM;
^ ~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: note: Value stored to 'err' is never read
err = -ENOMEM;
^ ~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dev_cap, 0, sizeof(*dev_cap));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dev_cap, 0, sizeof(*dev_cap));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3517:30: warning: Access to field 'flags2' results in a dereference of a null pointer (loaded from variable 'dev_cap') [clang-analyzer-core.NullDereference]
if (mlx4_is_master(dev) && (dev_cap->flags2 & MLX4_DEV_CAP_FLAG2_SYS_EQS)) {
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3341:2: note: 'dev_cap' initialized to a null pointer value
struct mlx4_dev_cap *dev_cap = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3347:2: note: Loop condition is false. Exiting loop
spin_lock_init(&priv->ctx_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3349:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->port_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3350:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->bond_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3353:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->pgdir_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3354:2: note: Loop condition is false. Exiting loop
spin_lock_init(&priv->cmd.context_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3357:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->bf_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3363:6: note: Assuming the condition is true
if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3363:2: note: Taking true branch
if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
--
^
drivers/net/ethernet/mellanox/mlx4/mlx4.h:219:2: note: expanded from macro 'mlx4_dbg'
if (mlx4_debug_level) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:2787:2: note: Loop condition is false. Exiting loop
mlx4_dbg(dev, "NOP command IRQ test passed\n");
^
drivers/net/ethernet/mellanox/mlx4/mlx4.h:217:41: note: expanded from macro 'mlx4_dbg'
#define mlx4_dbg(mdev, format, ...) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:2790:6: note: Assuming 'err' is 0
if (err) {
^~~
drivers/net/ethernet/mellanox/mlx4/main.c:2790:2: note: Taking false branch
if (err) {
^
drivers/net/ethernet/mellanox/mlx4/main.c:2796:6: note: Assuming 'err' is 0
if (err) {
^~~
drivers/net/ethernet/mellanox/mlx4/main.c:2796:2: note: Taking false branch
if (err) {
^
drivers/net/ethernet/mellanox/mlx4/main.c:2802:6: note: Assuming 'err' is 0
if (err) {
^~~
drivers/net/ethernet/mellanox/mlx4/main.c:2802:2: note: Taking false branch
if (err) {
^
drivers/net/ethernet/mellanox/mlx4/main.c:2807:6: note: Assuming the condition is true
if (!mlx4_is_slave(dev)) {
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2807:2: note: Taking true branch
if (!mlx4_is_slave(dev)) {
^
drivers/net/ethernet/mellanox/mlx4/main.c:2808:9: note: Calling 'mlx4_init_counters_table'
err = mlx4_init_counters_table(dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2509:6: note: Assuming the condition is false
if (!(dev->caps.flags & MLX4_DEV_CAP_FLAG_COUNTERS))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2509:2: note: Taking false branch
if (!(dev->caps.flags & MLX4_DEV_CAP_FLAG_COUNTERS))
^
drivers/net/ethernet/mellanox/mlx4/main.c:2512:6: note: Assuming field 'max_counters' is not equal to 0
if (!dev->caps.max_counters)
^~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2512:2: note: Taking false branch
if (!dev->caps.max_counters)
^
drivers/net/ethernet/mellanox/mlx4/main.c:2515:14: note: '?' condition is false
nent_pow2 = roundup_pow_of_two(dev->caps.max_counters);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
drivers/net/ethernet/mellanox/mlx4/main.c:2515:14: note: Calling '__roundup_pow_of_two'
nent_pow2 = roundup_pow_of_two(dev->caps.max_counters);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking false branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:156:9: note: Calling 'fls64'
return fls64(l);
^~~~~~~~
include/asm-generic/bitops/fls64.h:29:6: note: Assuming 'x' is not equal to 0
if (x == 0)
^~~~~~
include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
if (x == 0)
^
include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
return __fls(x) + 1;
^~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:156:9: note: Returning from 'fls64'
return fls64(l);
^~~~~~~~
include/linux/bitops.h:156:2: note: Returning the value 64
return fls64(l);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
97 warnings generated.
drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
>> drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-rxtx-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-rxtx-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-sq-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-sq-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-rbdr-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-rbdr-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
^~~~~~
include/linux/log2.h:67:13: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << (fls_long(n) - 1);
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1898:2: note: Taking false branch
if (pass1_silicon(nic->pdev))
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1901:2: note: Control jumps to 'case XDP_SETUP_PROG:' at line 1902
switch (xdp->command) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1903:10: note: Calling 'nicvf_xdp_setup'
return nicvf_xdp_setup(nic, xdp->prog);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:6: note: Assuming 'prog' is null
if (prog && dev->mtu > MAX_XDP_MTU) {
^~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:11: note: Left side of '&&' is false
if (prog && dev->mtu > MAX_XDP_MTU) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:6: note: Assuming the condition is false
if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:2: note: Taking false branch
if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:6: note: Assuming 'if_up' is true
if (if_up)
^~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:2: note: Taking true branch
if (if_up)
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Loop condition is false. Exiting loop
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1884:2: note: expanded from macro 'xchg'
kcsan_mb(); \
^
include/linux/kcsan-checks.h:264:20: note: expanded from macro 'kcsan_mb'
#define kcsan_mb() do { } while (0)
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Control jumps to 'case 8:' at line 1867
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
arch_xchg(__ai_ptr, __VA_ARGS__); \
^
arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
(__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr))); \
^
arch/riscv/include/asm/cmpxchg.h:122:2: note: expanded from macro '__xchg'
switch (size) { \
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Execution continues on line 1867
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
arch_xchg(__ai_ptr, __VA_ARGS__); \
^
arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
(__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr))); \
^
arch/riscv/include/asm/cmpxchg.h:136:3: note: expanded from macro '__xchg'
break; \
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1869:6: note: Assuming 'old_prog' is null
if (old_prog)
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Returning from 'fls'
fls(dev->caps.reserved_mtts - 1));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Passing the value 32 via 3rd parameter 'order'
fls(dev->caps.reserved_mtts - 1));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:963:3: note: Calling 'mlx4_free_mtt_range'
mlx4_free_mtt_range(dev, priv->reserved_mtts,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:236:6: note: Assuming the condition is false
if (mlx4_is_mfunc(dev)) {
^~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:236:2: note: Taking false branch
if (mlx4_is_mfunc(dev)) {
^
drivers/net/ethernet/mellanox/mlx4/mr.c:248:37: note: Passing the value 32 via 3rd parameter 'order'
__mlx4_free_mtt_range(dev, offset, order);
^~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:248:2: note: Calling '__mlx4_free_mtt_range'
__mlx4_free_mtt_range(dev, offset, order);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: Assuming '__UNIQUE_ID___x352' is <= '__UNIQUE_ID___y353'
seg_order = max_t(int, order - log_mtts_per_seg, 0);
^
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: '?' condition is false
seg_order = max_t(int, order - log_mtts_per_seg, 0);
^
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/net/ethernet/mellanox/mlx4/mr.c:228:21: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
offset + (1 << order) - 1);
^ ~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
>> drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(*data, "rxq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(*data, "rxq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(*data, "txq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(*data, "txq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "bgx_rxstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "bgx_rxstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "bgx_txstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "bgx_txstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, NIC_VF_REG_COUNT);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, NIC_VF_REG_COUNT);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(channel, 0, sizeof(*channel));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(channel, 0, sizeof(*channel));
^~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
115 warnings generated.
net/ipv4/ip_vti.c:286:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fl, 0, sizeof(fl));
^~~~~~
net/ipv4/ip_vti.c:286:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fl, 0, sizeof(fl));
^~~~~~
net/ipv4/ip_vti.c:291:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
^~~~~~
net/ipv4/ip_vti.c:291:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
^~~~~~
net/ipv4/ip_vti.c:295:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
^~~~~~
net/ipv4/ip_vti.c:295:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
^~~~~~
net/ipv4/ip_vti.c:429:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->broadcast, &iph->daddr, 4);
^~~~~~
net/ipv4/ip_vti.c:429:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->broadcast, &iph->daddr, 4);
^~~~~~
net/ipv4/ip_vti.c:535:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(parms, 0, sizeof(*parms));
^~~~~~
net/ipv4/ip_vti.c:535:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(parms, 0, sizeof(*parms));
^~~~~~
Suppressed 110 warnings (110 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
109 warnings generated.
drivers/net/ethernet/mellanox/mlx4/pd.c:154:23: warning: Division by zero [clang-analyzer-core.DivideZero]
offset = uar->index % ((int)pci_resource_len(dev->persist->pdev,
^
drivers/net/ethernet/mellanox/mlx4/pd.c:179:6: note: Assuming field 'bf_mapping' is non-null
if (!priv->bf_mapping)
--
^~~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/gpu/drm/drm_debugfs.c:214:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%d", minor_id);
^~~~~~~
drivers/gpu/drm/drm_debugfs.c:214:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%d", minor_id);
^~~~~~~
drivers/gpu/drm/drm_debugfs.c:246:22: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
list_for_each_safe(pos, q, &minor->debugfs_list) {
^
include/linux/list.h:607:31: note: expanded from macro 'list_for_each_safe'
for (pos = (head)->next, n = pos->next; \
^~~~~~~~~
drivers/gpu/drm/drm_debugfs.c:245:14: note: Assuming 'i' is < 'count'
for (i = 0; i < count; i++) {
^~~~~~~~~
drivers/gpu/drm/drm_debugfs.c:245:2: note: Loop condition is true. Entering loop body
for (i = 0; i < count; i++) {
^
drivers/gpu/drm/drm_debugfs.c:246:3: note: Loop condition is true. Entering loop body
list_for_each_safe(pos, q, &minor->debugfs_list) {
^
include/linux/list.h:607:2: note: expanded from macro 'list_for_each_safe'
for (pos = (head)->next, n = pos->next; \
^
drivers/gpu/drm/drm_debugfs.c:248:8: note: Assuming the condition is true
if (tmp->info_ent == &files[i]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/drm_debugfs.c:248:4: note: Taking true branch
if (tmp->info_ent == &files[i]) {
^
drivers/gpu/drm/drm_debugfs.c:251:5: note: Memory is released
kfree(tmp);
^~~~~~~~~~
drivers/gpu/drm/drm_debugfs.c:246:3: note: Loop condition is false. Execution continues on line 245
list_for_each_safe(pos, q, &minor->debugfs_list) {
^
include/linux/list.h:607:2: note: expanded from macro 'list_for_each_safe'
for (pos = (head)->next, n = pos->next; \
^
drivers/gpu/drm/drm_debugfs.c:245:14: note: Assuming 'i' is < 'count'
for (i = 0; i < count; i++) {
^~~~~~~~~
drivers/gpu/drm/drm_debugfs.c:245:2: note: Loop condition is true. Entering loop body
for (i = 0; i < count; i++) {
^
drivers/gpu/drm/drm_debugfs.c:246:22: note: Use of memory after it is freed
list_for_each_safe(pos, q, &minor->debugfs_list) {
^
include/linux/list.h:607:31: note: expanded from macro 'list_for_each_safe'
for (pos = (head)->next, n = pos->next; \
^~~~~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/gpu/drm/drm_debugfs_crc.c:330:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "0x%08x", entry->frame);
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:330:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "0x%08x", entry->frame);
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:332:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "XXXXXXXXXX");
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:332:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "XXXXXXXXXX");
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:335:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf + 10 + i * 11, " 0x%08x", entry->crcs[i]);
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:335:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf + 10 + i * 11, " 0x%08x", entry->crcs[i]);
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:336:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf + 10 + crc->values_cnt * 11, "\n");
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:336:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf + 10 + crc->values_cnt * 11, "\n");
^~~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&entry->crcs, crcs, sizeof(*crcs) * crc->values_cnt);
^~~~~~
drivers/gpu/drm/drm_debugfs_crc.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&entry->crcs, crcs, sizeof(*crcs) * crc->values_cnt);
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
>> drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s,type=0x%x\n",
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s,type=0x%x\n",
^~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
^~~~~~~~
drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
^~~~~~~~
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
Suppressed 57 warnings (57 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
fs/reiserfs/super.c:251:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&last_inode_key, 0, sizeof(last_inode_key));
^~~~~~
fs/reiserfs/super.c:251:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&last_inode_key, 0, sizeof(last_inode_key));
^~~~~~
fs/reiserfs/super.c:360:4: warning: Value stored to 'truncate' is never read [clang-analyzer-deadcode.DeadStores]
truncate = 0;
^ ~
fs/reiserfs/super.c:360:4: note: Value stored to 'truncate' is never read
truncate = 0;
^ ~
fs/reiserfs/super.c:648:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ei->i_dquot, 0, sizeof(ei->i_dquot));
^~~~~~
fs/reiserfs/super.c:648:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ei->i_dquot, 0, sizeof(ei->i_dquot));
^~~~~~
fs/reiserfs/super.c:1449:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qf_names, REISERFS_SB(s)->s_qf_names, sizeof(qf_names));
^~~~~~
fs/reiserfs/super.c:1449:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qf_names, REISERFS_SB(s)->s_qf_names, sizeof(qf_names));
^~~~~~
fs/reiserfs/super.c:2149:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rs->s_v1.s_magic,
^~~~~~
fs/reiserfs/super.c:2149:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rs->s_v1.s_magic,
^~~~~~
fs/reiserfs/super.c:2519:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, tocopy);
^~~~~~
fs/reiserfs/super.c:2519:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, tocopy);
^~~~~~
fs/reiserfs/super.c:2524:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, bh->b_data + offset, tocopy);
^~~~~~
fs/reiserfs/super.c:2524:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, bh->b_data + offset, tocopy);
^~~~~~
fs/reiserfs/super.c:2572:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bh->b_data + offset, data, tocopy);
^~~~~~
fs/reiserfs/super.c:2572:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bh->b_data + offset, data, tocopy);
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
crypto/algboss.c:96:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param->template, name, len);
^~~~~~
crypto/algboss.c:96:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param->template, name, len);
^~~~~~
crypto/algboss.c:126:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param->attrs[i].data.name, name, len);
^~~~~~
crypto/algboss.c:126:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param->attrs[i].data.name, name, len);
^~~~~~
crypto/algboss.c:209:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
^~~~~~
crypto/algboss.c:209:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
^~~~~~
crypto/algboss.c:210:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(param->alg, alg->cra_name, sizeof(param->alg));
^~~~~~
crypto/algboss.c:210:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(param->alg, alg->cra_name, sizeof(param->alg));
--
^~~~~~
fs/reiserfs/ibalance.c:457:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(key + 1, key,
^~~~~~~
fs/reiserfs/ibalance.c:457:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(key + 1, key,
^~~~~~~
fs/reiserfs/ibalance.c:461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, internal_key(src, src_position), KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, internal_key(src, src_position), KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:769:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(internal_key(tb->CFL[h], tb->lkey[h]), key, KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:769:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(internal_key(tb->CFL[h], tb->lkey[h]), key, KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:784:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(internal_key(tb->CFR[h], tb->rkey[h]), key, KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:784:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(internal_key(tb->CFR[h], tb->rkey[h]), key, KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:853:2: warning: Value stored to 'k' is never read [clang-analyzer-deadcode.DeadStores]
k = 0;
^ ~
fs/reiserfs/ibalance.c:853:2: note: Value stored to 'k' is never read
k = 0;
^ ~
fs/reiserfs/ibalance.c:1065:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_insert_key, internal_key(tbSh, n - snum),
^~~~~~
fs/reiserfs/ibalance.c:1065:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_insert_key, internal_key(tbSh, n - snum),
^~~~~~
fs/reiserfs/ibalance.c:1077:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_insert_key,
^~~~~~
fs/reiserfs/ibalance.c:1077:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_insert_key,
^~~~~~
fs/reiserfs/ibalance.c:1112:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_insert_key, insert_key + insert_num - k - 1,
^~~~~~
fs/reiserfs/ibalance.c:1112:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_insert_key, insert_key + insert_num - k - 1,
^~~~~~
fs/reiserfs/ibalance.c:1158:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_insert_key_addr, &new_insert_key, KEY_SIZE);
^~~~~~
fs/reiserfs/ibalance.c:1158:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_insert_key_addr, &new_insert_key, KEY_SIZE);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/misc/cb710/sgbuf2.c:33:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, miter->addr + miter->consumed, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:33:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, miter->addr + miter->consumed, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, left);
^~~~~~
drivers/misc/cb710/sgbuf2.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, left);
^~~~~~
drivers/misc/cb710/sgbuf2.c:108:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(miter->addr, addr, len);
^~~~~~
drivers/misc/cb710/sgbuf2.c:108:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(miter->addr, addr, len);
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/misc/cb710/debug.c:96:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:96:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
>> drivers/misc/cb710/debug.c:96:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:96:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(8)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:97:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:97:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:97:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:97:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(16)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:98:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:98:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
memset(®s, 0, sizeof(regs)); \
^~~~~~
drivers/misc/cb710/debug.c:98:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
drivers/misc/cb710/debug.c:98:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
CB710_REG_ACCESS_TEMPLATES(32)
^
drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
CB710_DUMP_REGS_TEMPLATE(t) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
p += sprintf(p, format, reg[j]); \
^~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
fs/ntfs/logfile.c:373:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(trp, rp, le32_to_cpu(rp->system_page_size));
^~~~~~
fs/ntfs/logfile.c:373:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(trp, rp, le32_to_cpu(rp->system_page_size));
^~~~~~
fs/ntfs/logfile.c:380:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(trp, rp, size);
--
irq_level,
phys_reg_addr,
idle_mode,
max_frame_size,
rbuf_fill_level,
rx_pio,
if_mode,
base_clock,
xsync,
xctrl,
init_error,
tx_count,
dcd_chkcount,
cts_chkcount,
dsr_chkcount,
ri_chkcount,
rbuf_count,
rbuf_current,
rbuf_index,
rbuf_fill_index,
tbuf_count,
tbuf_current,
tbuf_start,
tmp_rbuf_count,
netcount,
input_signal_events,
icount,
rbuf_fill_count,
bh_requested,
bh_running,
irq_requested,
irq_occurred,
reg_addr_requested,
rx_enabled,
rx_restart,
tx_enabled,
tx_active,
signals,
drop_rts_on_tx_done,
device_name,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct slgt_info {
~~~~~~~^~~~~~~~~~~
drivers/tty/synclink_gt.c:212:8: note: Excessive padding in 'struct slgt_info' (46 padding bytes, where 6 is optimal). Optimal fields order: if_ptr, next_device, pdev, gpio_wait_q, irq_flags, reg_addr, tx_buf, flag_buf, bufs, bufs_dma_addr, rbufs, tbufs, tmp_rbuf, port_array, params, lock, netlock, task, status_event_wait_q, event_wait_q, tx_timer, rx_timer, port, magic, port_count, adapter_num, port_num, line, timeout, x_char, read_status_mask, ignore_status_mask, gpio_present, pending_bh, isr_overflow, bus_type, irq_level, phys_reg_addr, idle_mode, max_frame_size, rbuf_fill_level, rx_pio, if_mode, base_clock, xsync, xctrl, init_error, tx_count, dcd_chkcount, cts_chkcount, dsr_chkcount, ri_chkcount, rbuf_count, rbuf_current, rbuf_index, rbuf_fill_index, tbuf_count, tbuf_current, tbuf_start, tmp_rbuf_count, netcount, input_signal_events, icount, rbuf_fill_count, bh_requested, bh_running, irq_requested, irq_occurred, reg_addr_requested, rx_enabled, rx_restart, tx_enabled, tx_active, signals, drop_rts_on_tx_done, device_name, consider reordering the fields or adding explicit padding members
struct slgt_info {
~~~~~~~^~~~~~~~~~~
drivers/tty/synclink_gt.c:1190:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RTS");
^~~~~~
drivers/tty/synclink_gt.c:1190:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RTS");
^~~~~~
drivers/tty/synclink_gt.c:1192:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CTS");
^~~~~~
drivers/tty/synclink_gt.c:1192:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CTS");
^~~~~~
drivers/tty/synclink_gt.c:1194:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DTR");
^~~~~~
drivers/tty/synclink_gt.c:1194:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DTR");
^~~~~~
drivers/tty/synclink_gt.c:1196:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|DSR");
^~~~~~
drivers/tty/synclink_gt.c:1196:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|DSR");
^~~~~~
drivers/tty/synclink_gt.c:1198:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|CD");
^~~~~~
drivers/tty/synclink_gt.c:1198:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|CD");
^~~~~~
drivers/tty/synclink_gt.c:1200:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(stat_buf, "|RI");
^~~~~~
drivers/tty/synclink_gt.c:1200:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(stat_buf, "|RI");
^~~~~~
drivers/tty/synclink_gt.c:2352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2515:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2515:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->icount, 0, sizeof(info->icount));
^~~~~~
drivers/tty/synclink_gt.c:2544:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:2544:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
^~~~~~
>> drivers/tty/synclink_gt.c:3430:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
^~~~~~~
drivers/tty/synclink_gt.c:3430:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
^~~~~~~
drivers/tty/synclink_gt.c:3507:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:3507:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
^~~~~~
drivers/tty/synclink_gt.c:3554:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
^~~~~~
drivers/tty/synclink_gt.c:3554:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
^~~~~~
drivers/tty/synclink_gt.c:4646:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, info->rbufs[i].buf, partial_count);
^~~~~~
drivers/tty/synclink_gt.c:4646:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, info->rbufs[i].buf, partial_count);
^~~~~~
drivers/tty/synclink_gt.c:4820:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(d->buf, buf, count);
^~~~~~
drivers/tty/synclink_gt.c:4820:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(d->buf, buf, count);
^~~~~~
drivers/tty/synclink_gt.c:4959:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(¶ms, &info->params, sizeof(params));
^~~~~~
drivers/tty/synclink_gt.c:4959:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(¶ms, &info->params, sizeof(params));
^~~~~~
drivers/tty/synclink_gt.c:4971:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
^~~~~~
drivers/tty/synclink_gt.c:4971:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
^~~~~~
drivers/tty/synclink_gt.c:4999:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&info->params, ¶ms, sizeof(info->params));
^~~~~~
drivers/tty/synclink_gt.c:4999:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&info->params, ¶ms, sizeof(info->params));
^~~~~~
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:439:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:439:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:563:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:563:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:695:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:695:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:876:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:876:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(¶ms, 0, sizeof(params));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:981:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&allocation, 0, sizeof(allocation));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:981:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&allocation, 0, sizeof(allocation));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1054:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&clk, 0, sizeof(clk));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1054:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&clk, 0, sizeof(clk));
^~~~~~
drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1124:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&clk, 0, sizeof(clk));
--
^~~~~~
net/tls/tls_sw.c:2533:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cctx->iv + salt_size, iv, iv_size);
^~~~~~
net/tls/tls_sw.c:2533:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cctx->iv + salt_size, iv, iv_size);
^~~~~~
net/tls/tls_sw.c:2571:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cb, 0, sizeof(cb));
^~~~~~
net/tls/tls_sw.c:2571:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cb, 0, sizeof(cb));
^~~~~~
Suppressed 116 warnings (116 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/regulator/ltc3676.c:76:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:76:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:77:6: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:77:6: note: Value stored to 'dcdc' during its initialization is never read
int dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:94:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:94:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:96:6: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:96:6: note: Value stored to 'dcdc' during its initialization is never read
int dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:121:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:121:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = ltc3676->dev;
^~~ ~~~~~~~~~~~~
drivers/regulator/ltc3676.c:122:11: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int ret, dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:122:11: note: Value stored to 'dcdc' during its initialization is never read
int ret, dcdc = rdev_get_id(rdev);
^~~~ ~~~~~~~~~~~~~~~~~
drivers/regulator/ltc3676.c:314:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(descs, ltc3676_regulators, sizeof(ltc3676_regulators));
^~~~~~
drivers/regulator/ltc3676.c:314:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(descs, ltc3676_regulators, sizeof(ltc3676_regulators));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
127 warnings generated.
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: warning: Value stored to 'num_msix' is never read [clang-analyzer-deadcode.DeadStores]
num_msix = adapter->ahw->num_msix;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: note: Value stored to 'num_msix' is never read
num_msix = adapter->ahw->num_msix;
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
^~~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%pM: %s" , adapter->mac_addr,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%pM: %s" , adapter->mac_addr,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: warning: Value stored to 'priv_level' is never read [clang-analyzer-deadcode.DeadStores]
priv_level = QLC_DEV_GET_DRV(op_mode, adapter->ahw->pci_func);
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: note: Value stored to 'priv_level' is never read
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nic_info, 0, sizeof(struct qlcnic_info));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sds_ring->name,
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tx_ring->name, sizeof(tx_ring->name),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tx_ring->name, sizeof(tx_ring->name),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&adapter->stats, 0, sizeof(adapter->stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&adapter->stats, 0, sizeof(adapter->stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2602:3: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
qlcnic_dcb_get_info(adapter->dcb);
^ ~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:2: note: Taking false branch
if (err)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:6: note: Assuming the condition is false
if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:2: note: Taking false branch
if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: 64 is equal to 64
err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: '?' condition is true
err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
^
include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
#define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:6: note: 'err' is 0
if (err) {
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:2: note: Taking false branch
if (err) {
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:6: note: Assuming 'err' is 0
if (err)
^~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:2: note: Taking false branch
if (err)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:6: note: Assuming 'ahw' is non-null
if (!ahw) {
^~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:2: note: Taking false branch
--
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/spi/spi-cadence-quadspi.c:621:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rxbuf, ®, read_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:621:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rxbuf, ®, read_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:628:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rxbuf, ®, read_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:628:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rxbuf, ®, read_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:688:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data, txbuf, write_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:688:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data, txbuf, write_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:695:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data, txbuf, write_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:695:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data, txbuf, write_len);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:799:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rxbuf, &temp, min((unsigned int)
^~~~~~
drivers/spi/spi-cadence-quadspi.c:799:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rxbuf, &temp, min((unsigned int)
^~~~~~
drivers/spi/spi-cadence-quadspi.c:1060:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&temp, txbuf, mod_bytes);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:1060:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&temp, txbuf, mod_bytes);
^~~~~~
drivers/spi/spi-cadence-quadspi.c:1602:22: warning: Value stored to 'np' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device_node *np = dev->of_node;
^~ ~~~~~~~~~~~~
drivers/spi/spi-cadence-quadspi.c:1602:22: note: Value stored to 'np' during its initialization is never read
struct device_node *np = dev->of_node;
^~ ~~~~~~~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
108 warnings generated.
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
^~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, qlcnic_get_regs_len(dev));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, qlcnic_get_regs_len(dev));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + ETH_ALEN, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + ETH_ALEN, mac, ETH_ALEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, *qlcnic_gstrings_test,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, *qlcnic_gstrings_test,
^~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx_queue_%d %s", i,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx_queue_%d %s", i,
^~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + index * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tx_stats, 0, sizeof(tx_stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tx_stats, 0, sizeof(tx_stats));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, stats->n_stats * sizeof(u64));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, stats->n_stats * sizeof(u64));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: warning: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index' [clang-analyzer-deadcode.DeadStores]
for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
^ ~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: note: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index'
for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
^ ~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
^~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:6: note: Assuming field 'rx_mini_pending' is 0
if (ring->rx_mini_pending)
^~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:2: note: Taking false branch
if (ring->rx_mini_pending)
^
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:678:12: note: Calling 'qlcnic_validate_ringparam'
num_rxd = qlcnic_validate_ringparam(ring->rx_pending,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:654:13: note: Assuming '__UNIQUE_ID___x462' is > '__UNIQUE_ID___y463'
num_desc = max(val, min);
^
include/linux/minmax.h:52:19: note: expanded from macro 'max'
#define max(x, y) __careful_cmp(x, y, >)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
--
drivers/net/ethernet/qlogic/qed/qed_debug.c:2606:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf, name);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buf + strlen(buf), mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf + strlen(buf), mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buf, mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buf, mem_group);
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
^~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
^~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dump_buf + offset, 0,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dump_buf + offset, 0,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hdr, 0, sizeof(*hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hdr, 0, sizeof(*hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(reg_hdr, 0, sizeof(*reg_hdr));
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: warning: Value stored to 'byte_buf' is never read [clang-analyzer-deadcode.DeadStores]
byte_buf += sizeof(signature);
^ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: note: Value stored to 'byte_buf' is never read
byte_buf += sizeof(signature);
^ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dump_buf + offset,
^~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: warning: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal).
Optimal fields order:
desc,
vf_desc,
type,
start_addr,
end_addr,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct igu_fifo_addr_data {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: note: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). Optimal fields order: desc, vf_desc, type, start_addr, end_addr, consider reordering the fields or adding explicit padding members
struct igu_fifo_addr_data {
~~~~~~~^~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(dest, source_str, size);
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(dest, source_str, size);
^~~~~~~
>> drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(qed_get_buf_ptr(results_buf,
^~~~~~~
drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(qed_get_buf_ptr(results_buf,
--
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
if (hw->shutting_down) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
if (hw->shutting_down) {
^
drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
if (hw->to_setup == 1) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
if (hw->to_setup == 1) {
^
drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
again |= get_packets_from_hw(hw);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true. Entering loop body
while (hw->rx_ready && !hw->blocking_rx) {
^
drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
do_receive_packet(hw);
^~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
if (hw->hw_version == HW_VERSION_1) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
if (hw->hw_version == HW_VERSION_1) {
^
drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
if (len > hw->ll_mtu) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
if (len > hw->ll_mtu) {
^
drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is < 'len'
for (i = 0; i < len; i += 2) {
^~~~~~~
drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is true. Entering loop body
for (i = 0; i < len; i += 2) {
^
drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is >= 'len'
for (i = 0; i < len; i += 2) {
^~~~~~~
drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is false. Execution continues on line 902
for (i = 0; i < len; i += 2) {
^
drivers/tty/ipwireless/hardware.c:904:2: note: Calling 'swap_packet_bitfield_from_le'
swap_packet_bitfield_from_le(pkt);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:904:2: note: Returning from 'swap_packet_bitfield_from_le'
swap_packet_bitfield_from_le(pkt);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:906:6: note: Assuming 'ipwireless_debug' is not equal to 0
if (ipwireless_debug)
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:906:2: note: Taking true branch
if (ipwireless_debug)
^
drivers/tty/ipwireless/hardware.c:907:3: note: Calling 'dump_data_bytes'
dump_data_bytes("recv", pkt, len);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:369:10: note: Calling 'data_type'
type, data_type(data, length));
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:347:6: note: 'length' is not equal to 0
if (length == 0)
^~~~~~
drivers/tty/ipwireless/hardware.c:347:2: note: Taking false branch
if (length == 0)
^
drivers/tty/ipwireless/hardware.c:350:23: note: The left operand of '&' is a garbage value
if (hdr->packet_rank & NL_FIRST_PACKET) {
~~~~~~~~~~~~~~~~ ^
>> drivers/tty/ipwireless/hardware.c:368:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
^~~~~~~
drivers/tty/ipwireless/hardware.c:368:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
^~~~~~~
drivers/tty/ipwireless/hardware.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt.rawpkt + header_size,
^~~~~~
drivers/tty/ipwireless/hardware.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt.rawpkt + header_size,
^~~~~~
drivers/tty/ipwireless/hardware.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(packet, old_packet,
^~~~~~
drivers/tty/ipwireless/hardware.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(packet, old_packet,
^~~~~~
drivers/tty/ipwireless/hardware.c:657:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((unsigned char *)(*assem) +
^~~~~~
drivers/tty/ipwireless/hardware.c:657:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((unsigned char *)(*assem) +
^~~~~~
drivers/tty/ipwireless/hardware.c:679:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
^~~~~~
drivers/tty/ipwireless/hardware.c:679:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
^~~~~~
drivers/tty/ipwireless/hardware.c:815:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
unsigned int protocol = packet->hdr.protocol;
^
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
if (hw->shutting_down) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
if (hw->shutting_down) {
^
drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
if (hw->to_setup == 1) {
^~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
if (hw->to_setup == 1) {
^
drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
again |= get_packets_from_hw(hw);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
do { \
^
drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&hw->lock, flags);
^
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
while (hw->rx_ready && !hw->blocking_rx) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true. Entering loop body
while (hw->rx_ready && !hw->blocking_rx) {
^
drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
do_receive_packet(hw);
^~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
if (hw->hw_version == HW_VERSION_1) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
if (hw->hw_version == HW_VERSION_1) {
^
drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
if (len > hw->ll_mtu) {
^~~~~~~~~~~~~~~~
drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
--
^
include/linux/log2.h:161:2: note: expanded from macro 'ilog2'
(sizeof(n) <= 4) ? \
^
drivers/net/ethernet/mellanox/mlx4/srq.c:188:49: note: Calling '__ilog2_u32'
srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^
include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
#define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
~~~~~~~~~~^~~
include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
(__builtin_constant_p((__u32)(x)) ? \
^
include/linux/log2.h:24:2: note: Returning the value -1
return fls(n) - 1;
^~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/srq.c:188:49: note: Returning from '__ilog2_u32'
srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^
include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
#define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
~~~~~~~~~~^~~
include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
(__builtin_constant_p((__u32)(x)) ? \
^
drivers/net/ethernet/mellanox/mlx4/srq.c:188:65: note: The result of the left shift is undefined because the left operand is negative
srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
^
include/linux/byteorder/generic.h:94:21: note: expanded from macro 'cpu_to_be32'
#define cpu_to_be32 __cpu_to_be32
^
include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
#define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
~~~~~~~~~~^~~
include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
(__builtin_constant_p((__u32)(x)) ? \
^
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/gpu/drm/msm/disp/dpu1/dpu_hw_sspp.c:705:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sspp_name, sizeof(sspp_name), "%d", hw_pipe->idx);
^~~~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_hw_sspp.c:705:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sspp_name, sizeof(sspp_name), "%d", hw_pipe->idx);
^~~~~~~~
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
Suppressed 94 warnings (94 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
137 warnings generated.
drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
^~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
^~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
^~~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ndata, 0, sizeof(struct octnic_data_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ndata, 0, sizeof(struct octnic_data_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(g->sg, 0, g->sg_size);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(g->sg, 0, g->sg_size);
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ivi, 0, sizeof(struct ifla_vf_info));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ivi, 0, sizeof(struct ifla_vf_info));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
--
drivers/uio/uio_aec.c:50:3: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status = ioread8(dev_info->priv + MAILBOX);
^
drivers/uio/uio_aec.c:50:3: note: Value stored to 'status' is never read
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/vfio/pci/vfio_pci_core.c:1280:9: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
mm = mmap_vma->vma->vm_mm;
^
drivers/vfio/pci/vfio_pci_core.c:644:6: note: Assuming the condition is false
if (cmd == VFIO_DEVICE_GET_INFO) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:644:2: note: Taking false branch
if (cmd == VFIO_DEVICE_GET_INFO) {
^
drivers/vfio/pci/vfio_pci_core.c:701:13: note: Assuming the condition is false
} else if (cmd == VFIO_DEVICE_GET_REGION_INFO) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:701:9: note: Taking false branch
} else if (cmd == VFIO_DEVICE_GET_REGION_INFO) {
^
drivers/vfio/pci/vfio_pci_core.c:846:13: note: Assuming the condition is false
} else if (cmd == VFIO_DEVICE_GET_IRQ_INFO) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:846:9: note: Taking false branch
} else if (cmd == VFIO_DEVICE_GET_IRQ_INFO) {
^
drivers/vfio/pci/vfio_pci_core.c:882:13: note: Assuming the condition is false
} else if (cmd == VFIO_DEVICE_SET_IRQS) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:882:9: note: Taking false branch
} else if (cmd == VFIO_DEVICE_SET_IRQS) {
^
drivers/vfio/pci/vfio_pci_core.c:917:13: note: Assuming the condition is true
} else if (cmd == VFIO_DEVICE_RESET) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:917:9: note: Taking true branch
} else if (cmd == VFIO_DEVICE_RESET) {
^
drivers/vfio/pci/vfio_pci_core.c:920:7: note: Assuming field 'reset_works' is true
if (!vdev->reset_works)
^~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:920:3: note: Taking false branch
if (!vdev->reset_works)
^
drivers/vfio/pci/vfio_pci_core.c:923:3: note: Calling 'vfio_pci_zap_and_down_write_memory_lock'
vfio_pci_zap_and_down_write_memory_lock(vdev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:1330:2: note: Calling 'vfio_pci_zap_and_vma_lock'
vfio_pci_zap_and_vma_lock(vdev, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:1267:2: note: Loop condition is true. Entering loop body
while (1) {
^
drivers/vfio/pci/vfio_pci_core.c:1270:7: note: 'try' is false
if (try) {
^~~
drivers/vfio/pci/vfio_pci_core.c:1270:3: note: Taking false branch
if (try) {
^
drivers/vfio/pci/vfio_pci_core.c:1276:3: note: Loop condition is true. Entering loop body
while (!list_empty(&vdev->vma_list)) {
^
drivers/vfio/pci/vfio_pci_core.c:1281:8: note: Assuming the condition is false
if (mmget_not_zero(mm))
^~~~~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:1281:4: note: Taking false branch
if (mmget_not_zero(mm))
^
drivers/vfio/pci/vfio_pci_core.c:1285:4: note: Memory is released
kfree(mmap_vma);
^~~~~~~~~~~~~~~
drivers/vfio/pci/vfio_pci_core.c:1276:3: note: Loop condition is true. Entering loop body
while (!list_empty(&vdev->vma_list)) {
^
drivers/vfio/pci/vfio_pci_core.c:1280:9: note: Use of memory after it is freed
mm = mmap_vma->vma->vm_mm;
^~~~~~~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
107 warnings generated.
>> drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->bus_info, "%s", pdev->name);
^~~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->bus_info, "%s", pdev->name);
^~~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
^~~~~~
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
110 warnings generated.
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
offset = CLE_PORT_OFFSET;
^
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: note: Value stored to 'offset' is never read
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&kn, 0, sizeof(kn));
^~~~~~
drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&kn, 0, sizeof(kn));
^~~~~~
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
drivers/media/dvb-frontends/sp887x.c:178:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[2], mem + i, c);
^~~~~~
drivers/media/dvb-frontends/sp887x.c:178:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[2], mem + i, c);
^~~~~~
drivers/media/dvb-frontends/sp887x.c:456:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
(sp887x_readreg(state, 0xc07) << 6);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/sp887x.c:456:10: note: Calling 'sp887x_readreg'
(sp887x_readreg(state, 0xc07) << 6);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:84:6: note: Assuming the condition is true
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:84:2: note: Taking true branch
if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
^
drivers/media/dvb-frontends/sp887x.c:85:3: note: Loop condition is false. Exiting loop
printk("%s: readreg error (ret == %i)\n", __func__, ret);
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/media/dvb-frontends/sp887x.c:86:3: note: Returning the value -1
return -1;
^~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:456:10: note: Returning from 'sp887x_readreg'
(sp887x_readreg(state, 0xc07) << 6);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/sp887x.c:456:39: note: The result of the left shift is undefined because the left operand is negative
(sp887x_readreg(state, 0xc07) << 6);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/sp887x.c:583:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/sp887x.c:583:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
164 warnings generated.
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(content, ' ', len);
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(content, ' ', len);
^~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(pos, result[i], strlen(result[i]));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(pos, result[i], strlen(result[i]));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(pos, items[i].name, strlen(items[i].name));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(pos, items[i].name, strlen(items[i].name));
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%d", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%d", i);
^~~~~~~
>> drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s", dim_state_str[dim->state]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s", dim_state_str[dim->state]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->profile_ix);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->profile_ix);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%s",
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%s",
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->steps_left);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->steps_left);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->steps_right);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->steps_right);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", dim->tired);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", dim->tired);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", coal->int_gl);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", coal->int_gl);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", coal->int_ql);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", coal->int_ql);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%u", reg_val);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "NA");
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "NA");
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%8u", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%8u", i);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%9u", ring->tx_copybreak);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%9u", ring->tx_copybreak);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->len);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->len);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->next_to_use);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->next_to_use);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(result[j++], "%3u", tx_spare->next_to_clean);
^~~~~~~
drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(result[j++], "%3u", tx_spare->next_to_clean);
--
^
drivers/media/rc/rc-main.c:389:32: note: The left operand of '==' is a garbage value
if (rc_map->scan[i].scancode == scancode)
~~~~~~~~~~~~~~~~~~~~~~~~ ^
drivers/media/rc/rc-main.c:405:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&rc_map->scan[i + 1], &rc_map->scan[i],
^~~~~~~
drivers/media/rc/rc-main.c:405:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&rc_map->scan[i + 1], &rc_map->scan[i],
^~~~~~~
drivers/media/rc/rc-main.c:573:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ke->scancode, &entry->scancode, sizeof(entry->scancode));
^~~~~~
drivers/media/rc/rc-main.c:573:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ke->scancode, &entry->scancode, sizeof(entry->scancode));
^~~~~~
drivers/media/rc/rc-main.c:1126:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
tmp += sprintf(tmp, "[%s] ", proto_names[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1126:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
tmp += sprintf(tmp, "[%s] ", proto_names[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1128:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
tmp += sprintf(tmp, "%s ", proto_names[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1128:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
tmp += sprintf(tmp, "%s ", proto_names[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1388:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%#x\n", val);
^~~~~~~
drivers/media/rc/rc-main.c:1388:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%#x\n", val);
^~~~~~~
drivers/media/rc/rc-main.c:1517:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
tmp += sprintf(tmp, "[%s] ", protocols[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1517:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
tmp += sprintf(tmp, "[%s] ", protocols[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1519:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
tmp += sprintf(tmp, "%s ", protocols[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1519:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
tmp += sprintf(tmp, "%s ", protocols[i].name);
^~~~~~~
drivers/media/rc/rc-main.c:1835:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->input_dev->id, &dev->input_id, sizeof(dev->input_id));
^~~~~~
drivers/media/rc/rc-main.c:1835:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->input_dev->id, &dev->input_id, sizeof(dev->input_id));
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/hwmon/scpi-hwmon.c:109:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n", (s64)value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:109:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld\n", (s64)value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:111:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", value);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:111:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", value);
^~~~~~~
>> drivers/hwmon/scpi-hwmon.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sensor->info.name);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sensor->info.name);
^~~~~~~
drivers/hwmon/scpi-hwmon.c:190:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:190:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:192:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:192:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:197:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:197:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:199:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:199:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:204:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:204:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:206:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:206:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:211:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:211:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:213:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:213:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:218:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:218:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->input, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:220:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
drivers/hwmon/scpi-hwmon.c:220:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(sensor->label, sizeof(sensor->input),
^~~~~~~~
Suppressed 20 warnings (20 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
66 warnings generated.
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&status, 0, sizeof(struct dpu_danger_safe_status));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&status, 0, sizeof(struct dpu_danger_safe_status));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/hwmon/max6697.c:265:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp * 125);
^~~~~~~
drivers/hwmon/max6697.c:265:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp * 125);
^~~~~~~
drivers/hwmon/max6697.c:282:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp * 1000);
^~~~~~~
drivers/hwmon/max6697.c:282:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp * 1000);
^~~~~~~
drivers/hwmon/max6697.c:297:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
^~~~~~~
drivers/hwmon/max6697.c:297:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
^~~~~~~
drivers/hwmon/max6697.c:388:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret < 0 ? ret : sprintf(buf, "%d\n", max6581_offset_to_millic(ret));
^~~~~~~
drivers/hwmon/max6697.c:388:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret < 0 ? ret : sprintf(buf, "%d\n", max6581_offset_to_millic(ret));
^~~~~~~
drivers/hwmon/max6697.c:628:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p, 0, sizeof(p));
^~~~~~
drivers/hwmon/max6697.c:628:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p, 0, sizeof(p));
^~~~~~
Suppressed 49 warnings (48 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
181 warnings generated.
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf((char *)bytes,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf((char *)bytes,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_priv_flags_strings[i]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_priv_flags_strings[i]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "%s", oct_vf_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "%s", oct_vf_stats_strings[j]);
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "tx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "rx-%d-%s", i,
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(resp, 0, sizeof(struct oct_intrmod_resp));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(resp, 0, sizeof(struct oct_intrmod_resp));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
^~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: note: Value stored to 'ret' is never read
ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
^~~~~~~
drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
--
^~~~~~
drivers/message/fusion/mptbase.c:5885:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:5886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:5886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:5931:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5931:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5933:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5933:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptbase.c:5934:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address,
^~~~~~
drivers/message/fusion/mptbase.c:5934:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address,
^~~~~~
drivers/message/fusion/mptbase.c:5937:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&phys_disk->Path[i].OwnerWWID,
^~~~~~
drivers/message/fusion/mptbase.c:5937:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&phys_disk->Path[i].OwnerWWID,
^~~~~~
drivers/message/fusion/mptbase.c:6082:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mem, (u8 *)pIoc3, iocpage3sz);
^~~~~~
drivers/message/fusion/mptbase.c:6082:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mem, (u8 *)pIoc3, iocpage3sz);
^~~~~~
drivers/message/fusion/mptbase.c:6243:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:6243:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptbase.c:6244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:6244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptbase.c:6269:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
^~~~~~
drivers/message/fusion/mptbase.c:6269:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
^~~~~~
drivers/message/fusion/mptbase.c:6270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
^~~~~~
drivers/message/fusion/mptbase.c:6270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
^~~~~~
drivers/message/fusion/mptbase.c:6271:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
^~~~~~
drivers/message/fusion/mptbase.c:6271:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
^~~~~~
drivers/message/fusion/mptbase.c:6293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&evn, 0, sizeof(EventNotification_t));
^~~~~~
drivers/message/fusion/mptbase.c:6293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&evn, 0, sizeof(EventNotification_t));
^~~~~~
drivers/message/fusion/mptbase.c:6294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
^~~~~~
drivers/message/fusion/mptbase.c:6294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
^~~~~~
drivers/message/fusion/mptbase.c:6396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
^~~~~~
drivers/message/fusion/mptbase.c:6396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
^~~~~~
drivers/message/fusion/mptbase.c:6787:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, " (Exp %02d%02d)",
^~~~~~~
drivers/message/fusion/mptbase.c:6787:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, " (Exp %02d%02d)",
^~~~~~~
drivers/message/fusion/mptbase.c:6793:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(buf, " [MDBG]");
^~~~~~
drivers/message/fusion/mptbase.c:6793:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(buf, " [MDBG]");
^~~~~~
>> drivers/message/fusion/mptbase.c:6820:6: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
^~~~~~~
drivers/message/fusion/mptbase.c:6820:6: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
^~~~~~~
drivers/message/fusion/mptbase.c:6831:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
^~~~~~~
drivers/message/fusion/mptbase.c:6831:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
^~~~~~~
drivers/message/fusion/mptbase.c:6834:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
^~~~~~~
drivers/message/fusion/mptbase.c:6834:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
^~~~~~~
drivers/message/fusion/mptbase.c:6837:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, " (disabled)");
^~~~~~~
drivers/message/fusion/mptbase.c:6837:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, " (disabled)");
^~~~~~~
drivers/message/fusion/mptbase.c:6839:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
y += sprintf(buffer+len+y, "\n");
^~~~~~~
drivers/message/fusion/mptbase.c:6839:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
y += sprintf(buffer+len+y, "\n");
^~~~~~~
drivers/message/fusion/mptbase.c:7025:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7025:2: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7174:3: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7174:3: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7197:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7197:2: note: Value stored to 'time_count' is never read
time_count = jiffies;
^ ~~~~~~~
drivers/message/fusion/mptbase.c:7787:8: warning: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii' [clang-analyzer-deadcode.DeadStores]
if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptbase.c:7787:8: note: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii'
if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptbase.c:8175:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(extend_desc, EVENT_DESCR_STR_SZ,
^~~~~~~~
drivers/message/fusion/mptbase.c:8175:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(extend_desc, EVENT_DESCR_STR_SZ,
^~~~~~~~
Suppressed 56 warnings (50 in non-user code, 6 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/char/virtio_console.c:682:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((__force char *)out_buf, buf->buf + buf->offset,
^~~~~~
drivers/char/virtio_console.c:682:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((__force char *)out_buf, buf->buf + buf->offset,
^~~~~~
drivers/char/virtio_console.c:897:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page) + offset, src + buf->offset, len);
^~~~~~
drivers/char/virtio_console.c:897:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page) + offset, src + buf->offset, len);
^~~~~~
drivers/char/virtio_console.c:1283:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", port->name);
^~~~~~~
drivers/char/virtio_console.c:1283:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", port->name);
^~~~~~~
drivers/char/virtio_console.c:1464:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
^~~~~~~~
drivers/char/virtio_console.c:1464:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
^~~~~~~~
drivers/char/virtio_console.c:1625:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~
drivers/char/virtio_console.c:1625:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~
drivers/char/virtio_console.c:1673:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~~
drivers/char/virtio_console.c:1673:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
--
drivers/media/dvb-frontends/ds3000.c:711:2: note: Loop condition is false. Execution continues on line 714
for (i = 0; i < d->msg_len; i++)
^
drivers/media/dvb-frontends/ds3000.c:720:28: note: The result of the left shift is undefined because the left operand is negative
data |= ((d->msg_len - 1) << 3) | 0x07;
~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/ds3000.c:850:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &ds3000_ops,
^~~~~~
drivers/media/dvb-frontends/ds3000.c:850:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &ds3000_ops,
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/fpga/zynqmp-fpga.c:55:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kbuf, buf, size);
^~~~~~
drivers/fpga/zynqmp-fpga.c:55:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kbuf, buf, size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
drivers/fpga/altera-pr-ip-core.c:188:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val = readl(priv->reg_base + ALT_PR_CSR_OFST);
^
drivers/fpga/altera-pr-ip-core.c:188:2: note: Value stored to 'val' is never read
Suppressed 17 warnings (17 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/fpga/dfl-fme-main.c:88:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:88:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:103:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:103:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:118:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:118:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:288:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:288:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:492:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", xeon_limit * 100000);
^~~~~~~
drivers/fpga/dfl-fme-main.c:492:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", xeon_limit * 100000);
^~~~~~~
drivers/fpga/dfl-fme-main.c:507:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fpga_limit * 100000);
^~~~~~~
drivers/fpga/dfl-fme-main.c:507:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fpga_limit * 100000);
^~~~~~~
drivers/fpga/dfl-fme-main.c:518:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:518:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/fpga/dfl-fme-main.c:622:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct platform_device *pdev = pdata->dev;
^~~~ ~~~~~~~~~~
drivers/fpga/dfl-fme-main.c:622:26: note: Value stored to 'pdev' during its initialization is never read
struct platform_device *pdev = pdata->dev;
^~~~ ~~~~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/md/dm-log-userspace-base.c:148:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
^~~~~~~
drivers/md/dm-log-userspace-base.c:148:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
^~~~~~~
>> drivers/md/dm-log-userspace-base.c:150:15: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str_size += sprintf(str + str_size, " %s", argv[i]);
^~~~~~~
drivers/md/dm-log-userspace-base.c:150:15: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str_size += sprintf(str + str_size, " %s", argv[i]);
^~~~~~~
drivers/md/dm-log-userspace-base.c:226:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(lc->uuid, argv[0], DM_UUID_LEN);
^~~~~~~
drivers/md/dm-log-userspace-base.c:226:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(lc->uuid, argv[0], DM_UUID_LEN);
^~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
88 warnings generated.
drivers/md/dm-log-userspace-transfer.c:61:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg, 0, sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:61:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg, 0, sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:119:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkg->data, tfr->data, tfr->data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:119:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkg->data, tfr->data, tfr->data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:201:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tfr->uuid, uuid, DM_UUID_LEN);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:201:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tfr->uuid, uuid, DM_UUID_LEN);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:215:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tfr->data, data, data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:215:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tfr->data, data, data_size);
^~~~~~
drivers/md/dm-log-userspace-transfer.c:217:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pkg, 0, sizeof(pkg));
^~~~~~
drivers/md/dm-log-userspace-transfer.c:217:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pkg, 0, sizeof(pkg));
^~~~~~
Suppressed 82 warnings (82 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
drivers/hwmon/tmp513.c:256:21: warning: The result of the right shift is undefined due to shifting by '229', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
max_val = U16_MAX >> tmp51x_get_pga_shift(data);
^
drivers/hwmon/tmp513.c:422:8: note: Calling 'tmp51x_get_reg'
reg = tmp51x_get_reg(type, attr, channel);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/tmp513.c:300:2: note: Control jumps to 'case hwmon_curr:' at line 326
switch (type) {
^
drivers/hwmon/tmp513.c:327:3: note: Control jumps to 'case hwmon_curr_lcrit:' at line 333
switch (attr) {
^
drivers/hwmon/tmp513.c:334:4: note: Returning the value 13, which participates in a condition later
return TMP51X_SHUNT_CURRENT_L_LIMIT;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/tmp513.c:422:8: note: Returning from 'tmp51x_get_reg'
reg = tmp51x_get_reg(type, attr, channel);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/tmp513.c:423:6: note: 'reg' is not equal to 0
if (reg == 0)
^~~
drivers/hwmon/tmp513.c:423:2: note: Taking false branch
if (reg == 0)
^
drivers/hwmon/tmp513.c:426:9: note: Calling 'tmp51x_set_value'
return tmp51x_set_value(dev_get_drvdata(dev), reg, val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/tmp513.c:248:2: note: Control jumps to 'case 13:' at line 250
switch (reg) {
^
drivers/hwmon/tmp513.c:255:9: note: Left side of '||' is false
val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
^
include/linux/math.h:89:3: note: expanded from macro 'DIV_ROUND_CLOSEST'
(((typeof(x))-1) > 0 || \
^
drivers/hwmon/tmp513.c:255:9: note: Left side of '||' is false
val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
^
include/linux/math.h:89:3: note: expanded from macro 'DIV_ROUND_CLOSEST'
(((typeof(x))-1) > 0 || \
^
drivers/hwmon/tmp513.c:255:9: note: Assuming '__x' is <= 0
val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
--
^~~~~~
drivers/net/ethernet/marvell/sky2.c:1352:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sky2->rx_le, 0, RX_LE_BYTES);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3392:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3392:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3497:9: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
imask |= portirq_msk[i];
^
drivers/net/ethernet/marvell/sky2.c:3517:2: note: Calling 'sky2_all_up'
sky2_all_up(hw);
^~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3488:29: note: The value 2 is assigned to 'i'
for (i = 0; i < hw->ports; i++) {
^~~
drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
for (i = 0; i < hw->ports; i++) {
^~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true. Entering loop body
for (i = 0; i < hw->ports; i++) {
^
drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
if (!netif_running(dev))
^~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
if (!netif_running(dev))
^
drivers/net/ethernet/marvell/sky2.c:3497:9: note: Assigned value is garbage or undefined
imask |= portirq_msk[i];
^ ~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:3804:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + i * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3804:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + i * ETH_GSTRING_LEN,
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3855:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(filter, 0, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3855:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(filter, 0, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3863:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(filter, 0xff, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:3863:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(filter, 0xff, sizeof(filter));
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4256:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, 128);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4256:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, 128);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4681:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4681:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/marvell/sky2.c:4772:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4772:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4774:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sz, "(chip %#x)", chipid);
^~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4774:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sz, "(chip %#x)", chipid);
^~~~~~~~
>> drivers/net/ethernet/marvell/sky2.c:4896:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
^~~~~~~
drivers/net/ethernet/marvell/sky2.c:4896:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
^~~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Assuming the condition is false
if (ering->rx_pending > RX_MAX_PENDING ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
drivers/net/ethernet/marvell/sky2.c:4173:6: note: Assuming field 'rx_pending' is >= 8
ering->rx_pending < 8 ||
^~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4174:6: note: Assuming the condition is false
ering->tx_pending < TX_MIN_PENDING ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4175:6: note: Assuming field 'tx_pending' is <= TX_MAX_PENDING
ering->tx_pending > TX_MAX_PENDING)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4172:2: note: Taking false branch
if (ering->rx_pending > RX_MAX_PENDING ||
^
drivers/net/ethernet/marvell/sky2.c:4182:23: note: Calling 'roundup_ring_size'
sky2->tx_ring_size = roundup_ring_size(sky2->tx_pending);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/marvell/sky2.c:4148:20: note: '?' condition is false
return max(128ul, roundup_pow_of_two(pending+1));
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
drivers/net/ethernet/marvell/sky2.c:4148:20: note: Calling '__roundup_pow_of_two'
return max(128ul, roundup_pow_of_two(pending+1));
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^
include/linux/minmax.h:52:36: note: expanded from macro 'max'
#define max(x, y) __careful_cmp(x, y, >)
~~~~~~~~~~~~~~~~~^~~~~
include/linux/minmax.h:38:17: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:32:25: note: expanded from macro '__cmp_once'
typeof(y) unique_y = (y); \
^
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking false branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:156:9: note: Calling 'fls64'
return fls64(l);
^~~~~~~~
include/asm-generic/bitops/fls64.h:29:6: note: 'x' is not equal to 0
if (x == 0)
^
include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
if (x == 0)
^
include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
return __fls(x) + 1;
^~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:156:9: note: Returning from 'fls64'
return fls64(l);
^~~~~~~~
include/linux/bitops.h:156:2: note: Returning the value 64
return fls64(l);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
--
^~~
drivers/hid/hid-kye.c:708:2: note: Taking false branch
if (ret) {
^
drivers/hid/hid-kye.c:714:6: note: Assuming 'ret' is 0
if (ret) {
^~~
drivers/hid/hid-kye.c:714:2: note: Taking false branch
if (ret) {
^
drivers/hid/hid-kye.c:719:2: note: Control jumps to 'case 20501:' @line 725
switch (id->product) {
^
drivers/hid/hid-kye.c:726:9: note: Calling 'kye_tablet_enable'
ret = kye_tablet_enable(hdev);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-kye.c:669:2: note: 'report' declared without an initial value
struct hid_report *report;
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-kye.c:673:2: note: Loop condition is false. Execution continues on line 679
list_for_each(head, list) {
^
include/linux/list.h:580:2: note: expanded from macro 'list_for_each'
for (pos = (head)->next; !list_is_head(pos, (head)); pos = pos->next)
^
drivers/hid/hid-kye.c:679:6: note: Assuming 'head' is not equal to 'list'
if (head == list) {
^~~~~~~~~~~~
drivers/hid/hid-kye.c:679:2: note: Taking false branch
if (head == list) {
^
drivers/hid/hid-kye.c:684:6: note: Access to field 'maxfield' results in a dereference of an undefined pointer value (loaded from variable 'report')
if (report->maxfield < 1 || report->field[0]->report_count < 7) {
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/hid/hid-lenovo.c:403:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
^~~~~~~~
drivers/hid/hid-lenovo.c:403:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
^~~~~~~~
drivers/hid/hid-lenovo.c:445:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:445:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:606:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:606:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:636:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
^~~~~~~~
drivers/hid/hid-lenovo.c:636:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
^~~~~~~~
drivers/hid/hid-lenovo.c:666:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:666:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
^~~~~~~~
drivers/hid/hid-lenovo.c:696:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
^~~~~~~~
drivers/hid/hid-lenovo.c:696:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
^~~~~~~~
drivers/hid/hid-lenovo.c:726:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:726:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:755:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:755:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u\n",
^~~~~~~~
drivers/hid/hid-lenovo.c:876:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
^~~~~~~~
drivers/hid/hid-lenovo.c:876:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
^~~~~~~~
drivers/hid/hid-lenovo.c:877:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name_micm, name_sz, "%s:amber:micmute", dev_name(&hdev->dev));
^~~~~~~~
drivers/hid/hid-lenovo.c:877:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name_micm, name_sz, "%s:amber:micmute", dev_name(&hdev->dev));
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(name, "qcom,hdmi-tx-%s", name3))
^~~~~~
drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(name, "qcom,hdmi-tx-%s", name3))
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
^~~~~~~~
drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
^~~~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/memstick/host/tifm_ms.c:222:22: warning: The right operand of '-' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
kunmap_atomic(buf - p_off);
^
drivers/memstick/host/tifm_ms.c:389:16: note: Loop condition is false. Exiting loop
fifo_status = readl(sock->addr + SOCK_DMA_FIFO_STATUS);
^
arch/riscv/include/asm/mmio.h:140:30: note: expanded from macro 'readl'
#define readl(c) ({ u32 __v; __io_br(); __v = readl_cpu(c); __io_ar(__v); __v; })
^
arch/riscv/include/asm/mmio.h:133:19: note: expanded from macro '__io_br'
#define __io_br() do {} while (0)
^
drivers/memstick/host/tifm_ms.c:390:16: note: Loop condition is false. Exiting loop
host_status = readl(sock->addr + SOCK_MS_STATUS);
^
arch/riscv/include/asm/mmio.h:140:30: note: expanded from macro 'readl'
#define readl(c) ({ u32 __v; __io_br(); __v = readl_cpu(c); __io_ar(__v); __v; })
^
arch/riscv/include/asm/mmio.h:133:19: note: expanded from macro '__io_br'
#define __io_br() do {} while (0)
^
drivers/memstick/host/tifm_ms.c:391:2: note: Loop condition is false. Exiting loop
dev_dbg(&sock->dev,
^
include/linux/dev_printk.h:158:2: note: expanded from macro 'dev_dbg'
dev_printk(KERN_DEBUG, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:128:3: note: expanded from macro 'dev_printk'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
drivers/memstick/host/tifm_ms.c:395:6: note: Assuming field 'req' is non-null
if (host->req) {
^~~~~~~~~
drivers/memstick/host/tifm_ms.c:395:2: note: Taking true branch
if (host->req) {
^
drivers/memstick/host/tifm_ms.c:396:7: note: Assuming field 'use_dma' is 0
if (host->use_dma && (fifo_status & 1)) {
^~~~~~~~~~~~~
drivers/memstick/host/tifm_ms.c:396:21: note: Left side of '&&' is false
if (host->use_dma && (fifo_status & 1)) {
^
drivers/memstick/host/tifm_ms.c:400:14: note: Field 'use_dma' is 0
if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
^
drivers/memstick/host/tifm_ms.c:400:7: note: Left side of '&&' is true
if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
^
drivers/memstick/host/tifm_ms.c:400:26: note: Assuming the condition is true
if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/memstick/host/tifm_ms.c:400:3: note: Taking true branch
if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
^
drivers/memstick/host/tifm_ms.c:401:9: note: Calling 'tifm_ms_transfer_data'
if (!tifm_ms_transfer_data(host)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/memstick/host/tifm_ms.c:190:6: note: Assuming field 'long_data' is 0
if (host->req->long_data) {
^~~~~~~~~~~~~~~~~~~~
drivers/memstick/host/tifm_ms.c:190:2: note: Taking false branch
if (host->req->long_data) {
^
drivers/memstick/host/tifm_ms.c:197:2: note: Loop condition is false. Exiting loop
dev_dbg(&sock->dev, "fifo data transfer, %d, %d\n", length,
--
^~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:1269:2: note: Taking false branch
if (hd->spi_pending) {
^
drivers/message/fusion/mptspi.c:1281:3: note: Loop condition is true. Entering loop body
shost_for_each_device(sdev, ioc->sh)
^
include/scsi/scsi_device.h:388:2: note: expanded from macro 'shost_for_each_device'
for ((sdev) = __scsi_iterate_devices((shost), NULL); \
^
drivers/message/fusion/mptspi.c:1282:4: note: Calling 'mptspi_dv_device'
mptspi_dv_device(hd, sdev);
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:690:6: note: Assuming field 'channel' is not equal to 0
if (sdev->channel == 0 &&
^~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:690:25: note: Left side of '&&' is false
if (sdev->channel == 0 &&
^
drivers/message/fusion/mptspi.c:695:6: note: Assuming field 'channel' is not equal to 1
if (sdev->channel == 1 &&
^~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:695:25: note: Left side of '&&' is false
if (sdev->channel == 1 &&
^
drivers/message/fusion/mptspi.c:706:6: note: Assuming field 'channel' is not equal to 1
if (sdev->channel == 1 &&
^~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:706:25: note: Left side of '&&' is false
if (sdev->channel == 1 &&
^
drivers/message/fusion/mptspi.c:711:2: note: Calling 'mptspi_read_parameters'
mptspi_read_parameters(sdev->sdev_target);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:600:2: note: Calling 'mptspi_read_spi_device_pg0'
mptspi_read_spi_device_pg0(starget, &spi_dev_pg0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:527:6: note: Assuming field 'channel' is equal to 0
if (starget->channel == 0 &&
^~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:527:6: note: Left side of '&&' is true
drivers/message/fusion/mptspi.c:528:6: note: Assuming the condition is true
mptspi_is_raid(hd, starget->id))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:527:2: note: Taking true branch
if (starget->channel == 0 &&
^
drivers/message/fusion/mptspi.c:529:3: note: Returning without writing to 'pass_pg0->NegotiatedParameters'
return -1;
^
drivers/message/fusion/mptspi.c:600:2: note: Returning from 'mptspi_read_spi_device_pg0'
mptspi_read_spi_device_pg0(starget, &spi_dev_pg0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptspi.c:602:7: note: Assigned value is garbage or undefined
nego = le32_to_cpu(spi_dev_pg0.NegotiatedParameters);
^
drivers/message/fusion/mptspi.c:880:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0, sizeof(hdr));
^~~~~~
drivers/message/fusion/mptspi.c:880:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0, sizeof(hdr));
^~~~~~
drivers/message/fusion/mptspi.c:887:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cfg, 0, sizeof(cfg));
^~~~~~
drivers/message/fusion/mptspi.c:887:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0, sizeof(cfg));
^~~~~~
drivers/message/fusion/mptspi.c:895:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pg1, pass_pg1, size);
^~~~~~
drivers/message/fusion/mptspi.c:895:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pg1, pass_pg1, size);
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/extcon/extcon-rt8973a.c:25:8: warning: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal).
Optimal fields order:
name,
irq,
virq,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct muic_irq {
~~~~~~~^~~~~~~~~~
drivers/extcon/extcon-rt8973a.c:25:8: note: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). Optimal fields order: name, irq, virq, consider reordering the fields or adding explicit padding members
struct muic_irq {
~~~~~~~^~~~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/vme/bridges/vme_tsi148.c:739:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:739:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
>> drivers/vme/bridges/vme_tsi148.c:754:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
^~~~~~~
drivers/vme/bridges/vme_tsi148.c:754:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
^~~~~~~
drivers/vme/bridges/vme_tsi148.c:786:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:786:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&image->bus_resource, 0, sizeof(image->bus_resource));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:1217:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1217:4: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1237:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1237:3: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1302:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1302:4: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1322:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1322:3: note: Value stored to 'done' is never read
done += 1;
^ ~
drivers/vme/bridges/vme_tsi148.c:1652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&entry->descriptor, 0, sizeof(entry->descriptor));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:1652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&entry->descriptor, 0, sizeof(entry->descriptor));
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2338:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(tsi148_bridge->name, driver_name);
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2338:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(tsi148_bridge->name, driver_name);
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2367:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tsi148_device->flush_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2367:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tsi148_device->flush_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2391:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&master_image->bus_resource, 0,
^~~~~~
drivers/vme/bridges/vme_tsi148.c:2391:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&master_image->bus_resource, 0,
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
drivers/w1/slaves/w1_ds2431.c:240:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp[addr & W1_F2D_SCRATCH_MASK], buf, copy);
^~~~~~
drivers/w1/slaves/w1_ds2431.c:240:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tmp[addr & W1_F2D_SCRATCH_MASK], buf, copy);
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
drivers/w1/slaves/w1_ds2805.c:239:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp[addr & W1_F0D_SCRATCH_MASK], buf, copy);
^~~~~~
drivers/w1/slaves/w1_ds2805.c:239:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tmp[addr & W1_F0D_SCRATCH_MASK], buf, copy);
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
drivers/w1/slaves/w1_ds28e04.c:137:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &data->memory[off], count);
^~~~~~
drivers/w1/slaves/w1_ds28e04.c:137:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &data->memory[off], count);
^~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/comedi/drivers/comedi_bond.c:175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&devs_opened, 0, sizeof(devs_opened));
--
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
net/nfc/nci/core.c:231:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmd.param.val, param->val, param->len);
^~~~~~
net/nfc/nci/core.c:231:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmd.param.val, param->val, param->len);
^~~~~~
net/nfc/nci/core.c:719:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cmd->params, params, params_len);
^~~~~~
net/nfc/nci/core.c:719:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cmd->params, params, params_len);
^~~~~~
net/nfc/nci/core.c:721:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ndev->cur_params,
^~~~~~
net/nfc/nci/core.c:721:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ndev->cur_params,
^~~~~~
net/nfc/nci/core.c:1219:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "%s_nci_cmd_wq", dev_name(dev));
^~~~~~~~
net/nfc/nci/core.c:1219:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "%s_nci_cmd_wq", dev_name(dev));
^~~~~~~~
net/nfc/nci/core.c:1227:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "%s_nci_rx_wq", dev_name(dev));
^~~~~~~~
net/nfc/nci/core.c:1227:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "%s_nci_rx_wq", dev_name(dev));
^~~~~~~~
net/nfc/nci/core.c:1235:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "%s_nci_tx_wq", dev_name(dev));
^~~~~~~~
net/nfc/nci/core.c:1235:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "%s_nci_tx_wq", dev_name(dev));
^~~~~~~~
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
126 warnings generated.
drivers/net/ethernet/sun/niu.c:1704:2: warning: Value stored to 'bmcr' is never read [clang-analyzer-deadcode.DeadStores]
bmcr = mii_read(np, np->phy_addr, MII_BMCR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:1704:2: note: Value stored to 'bmcr' is never read
bmcr = mii_read(np, np->phy_addr, MII_BMCR);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2215:3: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
niu_link_status_common(np, link_up);
^ ~~~~~~~
drivers/net/ethernet/sun/niu.c:2211:11: note: 'link_up' declared without an initial value
int err, link_up;
^~~~~~~
drivers/net/ethernet/sun/niu.c:2213:8: note: Calling 'niu_link_status'
err = niu_link_status(np, &link_up);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2201:6: note: Assuming field 'link_status' is null
if (ops->link_status)
^~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2201:2: note: Taking false branch
if (ops->link_status)
^
drivers/net/ethernet/sun/niu.c:2204:2: note: Returning without writing to '*link_up_p'
return err;
^
drivers/net/ethernet/sun/niu.c:2204:2: note: Returning zero (loaded from 'err'), which participates in a condition later
return err;
^~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2213:8: note: Returning from 'niu_link_status'
err = niu_link_status(np, &link_up);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:2214:7: note: 'err' is 0
if (!err)
^~~
drivers/net/ethernet/sun/niu.c:2214:2: note: Taking true branch
if (!err)
^
drivers/net/ethernet/sun/niu.c:2215:3: note: 2nd function call argument is an uninitialized value
niu_link_status_common(np, link_up);
^ ~~~~~~~
drivers/net/ethernet/sun/niu.c:3149:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ent, 0, sizeof(ent));
^~~~~~
drivers/net/ethernet/sun/niu.c:3149:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ent, 0, sizeof(ent));
^~~~~~
drivers/net/ethernet/sun/niu.c:4636:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:4636:2: note: Value stored to 'val' is never read
val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/sun/niu.c:5003:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:5003:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tp, 0, sizeof(*tp));
^~~~~~
>> drivers/net/ethernet/sun/niu.c:6008:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6008:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6011:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6011:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6012:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6012:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
^~~~~~~
drivers/net/ethernet/sun/niu.c:6018:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[i+j], "%s-rx-%d",
^~~~~~~
drivers/net/ethernet/sun/niu.c:6018:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[i+j], "%s-rx-%d",
^~~~~~~
drivers/net/ethernet/sun/niu.c:6021:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
^~~~~~~
drivers/net/ethernet/sun/niu.c:6021:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
^~~~~~~
drivers/net/ethernet/sun/niu.c:6032:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6032:2: note: Value stored to 'err' is never read
err = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6557:9: warning: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl' [clang-analyzer-deadcode.DeadStores]
ipv6 = ihl = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6557:9: note: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl'
ipv6 = ihl = 0;
^ ~
drivers/net/ethernet/sun/niu.c:6785:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
^~~~~~~~
drivers/net/ethernet/sun/niu.c:6785:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
^~~~~~~~
drivers/net/ethernet/sun/niu.c:6800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/net/ethernet/sun/niu.c:6800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd, 0, sizeof(*cmd));
^~~~~~
drivers/net/ethernet/sun/niu.c:6882:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, ((char *)&val) + b_offset, b_count);
^~~~~~
drivers/net/ethernet/sun/niu.c:6882:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, ((char *)&val) + b_offset, b_count);
^~~~~~
drivers/net/ethernet/sun/niu.c:6889:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &val, 4);
^~~~~~
drivers/net/ethernet/sun/niu.c:6889:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &val, 4);
^~~~~~
drivers/net/ethernet/sun/niu.c:6896:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, &val, len);
^~~~~~
drivers/net/ethernet/sun/niu.c:6896:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, &val, len);
^~~~~~
drivers/net/ethernet/sun/niu.c:7501:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:7501:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tp, 0, sizeof(*tp));
^~~~~~
drivers/net/ethernet/sun/niu.c:7739:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_xmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7739:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_xmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7743:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_bmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7743:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_bmac_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7748:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_rxchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7748:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_rxchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7753:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, niu_txchan_stat_keys,
^~~~~~
drivers/net/ethernet/sun/niu.c:7753:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, niu_txchan_stat_keys,
--
^~~~~~
drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:372:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:372:4: note: Value stored to 'err' is never read
err = 0;
^ ~
drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(val_buf, buf_rx->data, val_len);
^~~~~~
drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(val_buf, buf_rx->data, val_len);
^~~~~~
Suppressed 83 warnings (83 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/hid/hid-magicmouse.c:858:3: warning: Value stored to 'report' is never read [clang-analyzer-deadcode.DeadStores]
report = hid_register_report(hdev, HID_INPUT_REPORT,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-magicmouse.c:858:3: note: Value stored to 'report' is never read
report = hid_register_report(hdev, HID_INPUT_REPORT,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/hid/hid-microsoft.c:288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(*r));
^~~~~~
drivers/hid/hid-microsoft.c:288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(*r));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/hid/hid-multitouch.c:399:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", td->mtclass.quirks);
^~~~~~~
drivers/hid/hid-multitouch.c:399:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", td->mtclass.quirks);
^~~~~~~
drivers/hid/hid-multitouch.c:1620:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%s %s", hdev->name, suffix);
^~~~~~~
drivers/hid/hid-multitouch.c:1620:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%s %s", hdev->name, suffix);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
drivers/net/ethernet/freescale/fec_ptp.c:104:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val = 0;
^ ~
drivers/net/ethernet/freescale/fec_ptp.c:104:2: note: Value stored to 'val' is never read
val = 0;
^ ~
drivers/net/ethernet/freescale/fec_ptp.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fep->cc, 0, sizeof(fep->cc));
^~~~~~
drivers/net/ethernet/freescale/fec_ptp.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fep->cc, 0, sizeof(fep->cc));
^~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
95 warnings generated.
drivers/net/ethernet/freescale/gianfar.c:1684:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&edata, 0, sizeof(struct ethtool_eee));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1684:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&edata, 0, sizeof(struct ethtool_eee));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1694:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fcb, 0, GMAC_FCB_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1694:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fcb, 0, GMAC_FCB_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1841:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(skb->data, 0, GMAC_TXPAL_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:1841:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(skb->data, 0, GMAC_TXPAL_LEN);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2210:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2210:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&shhwtstamps, 0, sizeof(shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2473:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shhwtstamps, 0, sizeof(*shhwtstamps));
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:2473:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shhwtstamps, 0, sizeof(*shhwtstamps));
^~~~~~
>> drivers/net/ethernet/freescale/gianfar.c:3325:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3325:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3327:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3327:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3329:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3329:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
^~~~~~~
drivers/net/ethernet/freescale/gianfar.c:3332:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(gfar_irq(grp, TX)->name, dev->name);
^~~~~~
drivers/net/ethernet/freescale/gianfar.c:3332:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(gfar_irq(grp, TX)->name, dev->name);
^~~~~~
Suppressed 86 warnings (86 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/parport/share.c:459:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:459:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:490:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
drivers/parport/share.c:490:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/parport/ieee1284_ops.c:599:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (buf, byte, rle_count);
^~~~~~
drivers/parport/ieee1284_ops.c:599:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (buf, byte, rle_count);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
114 warnings generated.
drivers/net/wireguard/socket.c:237:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(endpoint, 0, sizeof(*endpoint));
^~~~~~
drivers/net/wireguard/socket.c:237:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(endpoint, 0, sizeof(*endpoint));
^~~~~~
drivers/net/wireguard/socket.c:310:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&peer->endpoint.src6, 0, sizeof(peer->endpoint.src6));
^~~~~~
drivers/net/wireguard/socket.c:310:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&peer->endpoint.src6, 0, sizeof(peer->endpoint.src6));
^~~~~~
Suppressed 112 warnings (112 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
Suppressed 94 warnings (94 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
drivers/net/wireguard/allowedips.c:31:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(node->bits, src, bits / 8U);
^~~~~~
drivers/net/wireguard/allowedips.c:31:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(node->bits, src, bits / 8U);
^~~~~~
drivers/net/wireguard/allowedips.c:344:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ip + cidr_bytes, 0, node->bitlen / 8U - cidr_bytes);
^~~~~~
drivers/net/wireguard/allowedips.c:344:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ip + cidr_bytes, 0, node->bitlen / 8U - cidr_bytes);
^~~~~~
Suppressed 94 warnings (94 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
drivers/net/wireguard/ratelimiter.c:103:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ip, &ipv6_hdr(skb)->saddr, sizeof(ip));
^~~~~~
drivers/net/wireguard/ratelimiter.c:103:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ip, &ipv6_hdr(skb)->saddr, sizeof(ip));
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
drivers/net/wireguard/ratelimiter.c:161:6: note: Assuming the condition is false
if (++init_refcnt != 1)
--
^
drivers/atm/iphase.c:1876:13: note: Assuming field 'traffic_class' is equal to ATM_CBR
} else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:1876:9: note: Taking true branch
} else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
^
drivers/atm/iphase.c:1877:17: note: Taking false branch
if (iadev->phy_type & FE_25MBIT_PHY) {
^
drivers/atm/iphase.c:1881:21: note: Assuming field 'max_pcr' is <= field 'LineRate'
if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:1881:17: note: Taking false branch
if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
^
drivers/atm/iphase.c:1887:28: note: Calling 'ia_cbr_setup'
if ((ret = ia_cbr_setup (iadev, vcc)) < 0) {
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:474:8: note: Assuming field 'max_pcr' is > 0
if (vcc->qos.txtp.max_pcr <= 0) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:474:4: note: Taking false branch
if (vcc->qos.txtp.max_pcr <= 0) {
^
drivers/atm/iphase.c:479:4: note: Value assigned to 'entries'
entries = rate / dev->Granularity;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:480:4: note: Assuming the condition is false
IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:480:4: note: Taking false branch
IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:482:8: note: Assuming 'entries' is < 1
if (entries < 1)
^~~~~~~~~~~
drivers/atm/iphase.c:482:4: note: Taking true branch
if (entries < 1)
^
drivers/atm/iphase.c:483:7: note: Taking false branch
IF_CBR(printk("CBR: Bandwidth smaller than granularity of CBR table\n");)
^
drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
#define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:486:8: note: Assuming the condition is false
if (3*(rate - rateLow) > (rateHigh - rate))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:486:4: note: Taking false branch
if (3*(rate - rateLow) > (rateHigh - rate))
^
drivers/atm/iphase.c:488:8: note: 'entries' is <= field 'CbrRemEntries'
if (entries > dev->CbrRemEntries) {
^~~~~~~
drivers/atm/iphase.c:488:4: note: Taking false branch
if (entries > dev->CbrRemEntries) {
^
drivers/atm/iphase.c:502:33: note: Division by zero
spacing = dev->CbrTotEntries / entries;
~~~~~~~~~~~~~~~~~~~^~~~~~~~~
drivers/atm/iphase.c:534:7: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:534:7: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:545:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:545:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:559:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:559:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
^~~~~~
drivers/atm/iphase.c:562:8: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
^~~~~~
drivers/atm/iphase.c:562:8: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
^~~~~~
>> drivers/atm/iphase.c:985:17: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, "%s", prefix );
^~~~~~~
drivers/atm/iphase.c:985:17: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, "%s", prefix );
^~~~~~~
drivers/atm/iphase.c:988:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:988:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:989:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
^~~~~~~
drivers/atm/iphase.c:989:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
^~~~~~~
drivers/atm/iphase.c:993:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:993:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:994:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:994:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:996:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:996:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf( pBuf, " " );
^~~~~~~
drivers/atm/iphase.c:1001:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf(pBuf, "%c", c);
^~~~~~~
drivers/atm/iphase.c:1001:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf(pBuf, "%c", c);
^~~~~~~
drivers/atm/iphase.c:1003:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pBuf += sprintf(pBuf, ".");
^~~~~~~
drivers/atm/iphase.c:1003:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pBuf += sprintf(pBuf, ".");
^~~~~~~
drivers/atm/iphase.c:1396:30: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
*vc_table = vcc->vci << 6;
^
drivers/atm/iphase.c:2696:6: note: Assuming the condition is false
if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2696:2: note: Taking false branch
if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))
^
drivers/atm/iphase.c:2701:6: note: Assuming the condition is false
if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2701:33: note: Left side of '&&' is false
if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)
^
drivers/atm/iphase.c:2706:6: note: Assuming field 'aal' is equal to ATM_AAL5
if (vcc->qos.aal != ATM_AAL5)
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2706:2: note: Taking false branch
if (vcc->qos.aal != ATM_AAL5)
^
drivers/atm/iphase.c:2708:2: note: Assuming the condition is false
IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n",
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^~~~~~~~~~~~~~~~~
drivers/atm/iphase.c:2708:2: note: Taking false branch
IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n",
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
^
drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
#define IF_IADBG(f) if (IADebugFlag & (f))
^
drivers/atm/iphase.c:2713:6: note: Assuming 'ia_vcc' is non-null
if (!ia_vcc) return -ENOMEM;
^~~~~~~
drivers/atm/iphase.c:2713:2: note: Taking false branch
if (!ia_vcc) return -ENOMEM;
^
drivers/atm/iphase.c:2716:15: note: Calling 'open_rx'
if ((error = open_rx(vcc)))
^~~~~~~~~~~~
drivers/atm/iphase.c:1380:2: note: Assuming the condition is false
IF_EVENT(printk("iadev: open_rx %d.%d\n", vcc->vpi, vcc->vci);)
^
drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
#define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
--
^~~~~~~~~~~~~~
net/sched/sch_ets.c:662:2: note: Loop condition is false. Execution continues on line 668
for (i = nstrict; i < q->nstrict; i++) {
^
net/sched/sch_ets.c:668:22: note: Assuming 'i' is >= 'oldbands'
for (i = q->nbands; i < oldbands; i++) {
^~~~~~~~~~~~
net/sched/sch_ets.c:668:2: note: Loop condition is false. Execution continues on line 673
for (i = q->nbands; i < oldbands; i++) {
^
net/sched/sch_ets.c:676:14: note: 'i' is < field 'nbands'
for (i = 0; i < q->nbands; i++)
^
net/sched/sch_ets.c:676:2: note: Loop condition is true. Entering loop body
for (i = 0; i < q->nbands; i++)
^
net/sched/sch_ets.c:676:14: note: Assuming 'i' is < field 'nbands'
for (i = 0; i < q->nbands; i++)
^~~~~~~~~~~~~
net/sched/sch_ets.c:676:2: note: Loop condition is true. Entering loop body
for (i = 0; i < q->nbands; i++)
^
net/sched/sch_ets.c:676:14: note: Assuming 'i' is >= field 'nbands'
for (i = 0; i < q->nbands; i++)
^~~~~~~~~~~~~
net/sched/sch_ets.c:676:2: note: Loop condition is false. Execution continues on line 679
for (i = 0; i < q->nbands; i++)
^
net/sched/sch_ets.c:679:7: note: The value of 'oldbands' is assigned to 'i'
for (i = oldbands; i < q->nbands; i++) {
^~~~~~~~~~~~
net/sched/sch_ets.c:679:21: note: Assuming 'i' is < field 'nbands'
for (i = oldbands; i < q->nbands; i++) {
^~~~~~~~~~~~~
net/sched/sch_ets.c:679:2: note: Loop condition is true. Entering loop body
for (i = oldbands; i < q->nbands; i++) {
^
net/sched/sch_ets.c:680:23: note: Assigned value is garbage or undefined
q->classes[i].qdisc = queues[i];
^ ~~~~~~~~~
net/sched/sch_ets.c:694:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
^~~~~~
net/sched/sch_ets.c:694:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
^~~~~~
Suppressed 80 warnings (80 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
sound/core/seq/seq_ports.c:136:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:136:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:155:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:155:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(new_port->name, "port-%d", num);
^~~~~~~
sound/core/seq/seq_ports.c:670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:702:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
sound/core/seq/seq_ports.c:702:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&portinfo, 0, sizeof(portinfo));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
sound/spi/at73c213.c:714:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(card->mixername, chip->pcm->name);
^~~~~~
sound/spi/at73c213.c:714:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(card->mixername, chip->pcm->name);
^~~~~~
sound/spi/at73c213.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&chip->reg_image, &snd_at73c213_original_image,
^~~~~~
sound/spi/at73c213.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&chip->reg_image, &snd_at73c213_original_image,
^~~~~~
sound/spi/at73c213.c:962:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
^~~~~~~~
sound/spi/at73c213.c:962:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
^~~~~~~~
sound/spi/at73c213.c:985:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(card->shortname, board->shortname);
^~~~~~
sound/spi/at73c213.c:985:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(card->shortname, board->shortname);
^~~~~~
>> sound/spi/at73c213.c:986:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
^~~~~~~
sound/spi/at73c213.c:986:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
105 warnings generated.
drivers/message/fusion/mptsas.c:165:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptsas.c:165:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptsas.c:208:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptsas.c:208:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
^~~~~~
drivers/message/fusion/mptsas.c:498:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
^~~~~~
drivers/message/fusion/mptsas.c:498:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
^~~~~~
drivers/message/fusion/mptsas.c:661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
^~~~~~
drivers/message/fusion/mptsas.c:661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
^~~~~~
drivers/message/fusion/mptsas.c:690:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptsas.c:690:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cfg, 0 , sizeof(CONFIGPARMS));
^~~~~~
drivers/message/fusion/mptsas.c:691:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptsas.c:691:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
^~~~~~
drivers/message/fusion/mptsas.c:796:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
^~~~~~
drivers/message/fusion/mptsas.c:796:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
^~~~~~
drivers/message/fusion/mptsas.c:884:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
^~~~~~
drivers/message/fusion/mptsas.c:884:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
^~~~~~
drivers/message/fusion/mptsas.c:917:31: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
port_details->phy_bitmask |=
^
drivers/message/fusion/mptsas.c:5169:6: note: Assuming 'r' is 0
if (r)
^
drivers/message/fusion/mptsas.c:5169:2: note: Taking false branch
if (r)
^
drivers/message/fusion/mptsas.c:5182:6: note: Assuming field 'last_state' is equal to MPI_IOC_STATE_OPERATIONAL
if (ioc->last_state != MPI_IOC_STATE_OPERATIONAL) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptsas.c:5182:2: note: Taking false branch
if (ioc->last_state != MPI_IOC_STATE_OPERATIONAL) {
^
drivers/message/fusion/mptsas.c:5190:6: note: Assuming field 'active' is not equal to 0
if (!ioc->active) {
^~~~~~~~~~~~
drivers/message/fusion/mptsas.c:5190:2: note: Taking false branch
if (!ioc->active) {
^
drivers/message/fusion/mptsas.c:5200:15: note: Assuming 'ii' is < field 'NumberOfPorts'
for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptsas.c:5200:2: note: Loop condition is true. Entering loop body
for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
^
drivers/message/fusion/mptsas.c:5201:7: note: Assuming the condition is true
if (ioc->pfacts[ii].ProtocolFlags &
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptsas.c:5201:3: note: Taking true branch
if (ioc->pfacts[ii].ProtocolFlags &
^
drivers/message/fusion/mptsas.c:5200:15: note: Assuming 'ii' is >= field 'NumberOfPorts'
for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/message/fusion/mptsas.c:5200:2: note: Loop condition is false. Execution continues on line 5206
for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
^
drivers/message/fusion/mptsas.c:5206:7: note: 'ioc_cap' is 1
if (!ioc_cap) {
^~~~~~~
drivers/message/fusion/mptsas.c:5206:2: note: Taking false branch
if (!ioc_cap) {
--
88 warnings generated.
Suppressed 88 warnings (88 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
129 warnings generated.
drivers/net/ethernet/intel/igc/igc_main.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ring->rx_buffer_info, 0,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ring->rx_buffer_info, 0,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:878:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:878:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:914:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:914:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:929:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:929:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:954:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:954:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:992:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:992:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:1776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:1776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2899:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2899:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2928:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2928:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2964:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:2964:21: note: Value stored to 'dev' during its initialization is never read
struct net_device *dev = adapter->netdev;
^~~ ~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:3238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&flex->data[offset], src, len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:3238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&flex->data[offset], src, len);
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4011:3: warning: Value stored to 'current_itr' is never read [clang-analyzer-deadcode.DeadStores]
current_itr = 0;
^ ~
drivers/net/ethernet/intel/igc/igc_main.c:4011:3: note: Value stored to 'current_itr' is never read
current_itr = 0;
^ ~
drivers/net/ethernet/intel/igc/igc_main.c:4168:6: warning: Value stored to 'new_val' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
int new_val = q_vector->itr_val;
^~~~~~~ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4168:6: note: Value stored to 'new_val' during its initialization is never read
int new_val = q_vector->itr_val;
^~~~~~~ ~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4350:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4350:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4928:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stats, &adapter->stats64, sizeof(*stats));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:4928:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stats, &adapter->stats64, sizeof(*stats));
^~~~~~
>> drivers/net/ethernet/intel/igc/igc_main.c:5173:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5173:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5176:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-tx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5176:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-tx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5179:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-rx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5179:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-rx-%u", netdev->name,
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5182:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(q_vector->name, "%s-unused", netdev->name);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:5182:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(q_vector->name, "%s-unused", netdev->name);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6332:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6332:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
^~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(netdev->name, "eth%d", IFNAMSIZ);
^~~~~~~
drivers/net/ethernet/intel/igc/igc_main.c:6448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(netdev->name, "eth%d", IFNAMSIZ);
^~~~~~~
Suppressed 106 warnings (106 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
drivers/ata/libata-eh.c:678:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link->eh_context, 0, sizeof(link->eh_context));
^~~~~~
drivers/ata/libata-eh.c:678:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link->eh_context, 0, sizeof(link->eh_context));
^~~~~~
drivers/ata/libata-eh.c:680:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:680:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:730:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:730:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:1464:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sense_buf, 0, SCSI_SENSE_BUFFERSIZE);
^~~~~~
drivers/ata/libata-eh.c:1464:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sense_buf, 0, SCSI_SENSE_BUFFERSIZE);
^~~~~~
drivers/ata/libata-eh.c:1743:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&arg, 0, sizeof(arg));
^~~~~~
drivers/ata/libata-eh.c:1743:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&arg, 0, sizeof(arg));
^~~~~~
drivers/ata/libata-eh.c:1762:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&arg, 0, sizeof(arg));
^~~~~~
drivers/ata/libata-eh.c:1762:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&arg, 0, sizeof(arg));
^~~~~~
drivers/ata/libata-eh.c:2247:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tries_buf, sizeof(tries_buf), " t%d",
^~~~~~~~
drivers/ata/libata-eh.c:2247:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tries_buf, sizeof(tries_buf), " t%d",
^~~~~~~~
drivers/ata/libata-eh.c:2335:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(data_buf, sizeof(data_buf), " %s %u %s",
^~~~~~~~
drivers/ata/libata-eh.c:2335:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(data_buf, sizeof(data_buf), " %s %u %s",
^~~~~~~~
drivers/ata/libata-eh.c:2717:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:2717:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&link->eh_info, 0, sizeof(link->eh_info));
^~~~~~
drivers/ata/libata-eh.c:2719:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&slave->eh_info, 0, sizeof(link->eh_info));
--
memset(&priv->rx_priority_flowstats, 0,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2053:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&priv->tx_priority_flowstats, 0,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2053:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&priv->tx_priority_flowstats, 0,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2055:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&priv->pf_stats, 0, sizeof(priv->pf_stats));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2055:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&priv->pf_stats, 0, sizeof(priv->pf_stats));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2222:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dst->hwtstamp_config, &prof->hwtstamp_config,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2222:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dst->hwtstamp_config, &prof->hwtstamp_config,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2268:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst->rx_ring, src->rx_ring,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2268:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst->rx_ring, src->rx_ring,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst->rx_cq, src->rx_cq,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst->rx_cq, src->rx_cq,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2272:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dst->hwtstamp_config, &src->hwtstamp_config,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2272:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dst->hwtstamp_config, &src->hwtstamp_config,
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2281:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst->prof, src->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2281:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst->prof, src->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3099:3: warning: Value stored to 'last_i' is never read [clang-analyzer-deadcode.DeadStores]
last_i += NUM_FLOW_STATS_TX;
^
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3099:3: note: Value stored to 'last_i' is never read
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3155:2: warning: Value stored to 'last_i' is never read [clang-analyzer-deadcode.DeadStores]
last_i += NUM_PHY_STATS;
^
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3155:2: note: Value stored to 'last_i' is never read
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3182:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(priv, 0, sizeof(struct mlx4_en_priv));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3182:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(priv, 0, sizeof(struct mlx4_en_priv));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3287:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->current_mac, dev->dev_addr, sizeof(priv->current_mac));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3287:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->current_mac, dev->dev_addr, sizeof(priv->current_mac));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3521:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3521:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3522:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_prof.hwtstamp_config, &ts_config, sizeof(ts_config));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3522:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_prof.hwtstamp_config, &ts_config, sizeof(ts_config));
^~~~~~
Suppressed 120 warnings (120 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
drivers/net/ethernet/mellanox/mlx4/main.c:562:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hca_param, 0, sizeof(hca_param));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:562:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hca_param, 0, sizeof(hca_param));
^~~~~~
>> drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(type, "%s",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(type, "%s",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "auto (%s)\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "auto (%s)\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%s\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%s\n", type);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "%d\n",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "%d\n",
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->dev_name, "mlx4_port%d", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->dev_name, "mlx4_port%d", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -ENOMEM;
^ ~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: note: Value stored to 'err' is never read
err = -ENOMEM;
^ ~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dev_cap, 0, sizeof(*dev_cap));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dev_cap, 0, sizeof(*dev_cap));
^~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3517:30: warning: Access to field 'flags2' results in a dereference of a null pointer (loaded from variable 'dev_cap') [clang-analyzer-core.NullDereference]
if (mlx4_is_master(dev) && (dev_cap->flags2 & MLX4_DEV_CAP_FLAG2_SYS_EQS)) {
^~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3341:2: note: 'dev_cap' initialized to a null pointer value
struct mlx4_dev_cap *dev_cap = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3347:2: note: Loop condition is false. Exiting loop
spin_lock_init(&priv->ctx_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3349:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->port_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3350:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->bond_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3353:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->pgdir_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3354:2: note: Loop condition is false. Exiting loop
spin_lock_init(&priv->cmd.context_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3357:2: note: Loop condition is false. Exiting loop
mutex_init(&priv->bf_mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/net/ethernet/mellanox/mlx4/main.c:3363:6: note: Assuming the condition is true
if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/main.c:3363:2: note: Taking true branch
if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
--
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Returning from 'fls'
fls(dev->caps.reserved_mtts - 1));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Passing the value 32 via 3rd parameter 'order'
fls(dev->caps.reserved_mtts - 1));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:963:3: note: Calling 'mlx4_free_mtt_range'
mlx4_free_mtt_range(dev, priv->reserved_mtts,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:236:6: note: Assuming the condition is false
if (mlx4_is_mfunc(dev)) {
^~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:236:2: note: Taking false branch
if (mlx4_is_mfunc(dev)) {
^
drivers/net/ethernet/mellanox/mlx4/mr.c:248:37: note: Passing the value 32 via 3rd parameter 'order'
__mlx4_free_mtt_range(dev, offset, order);
^~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:248:2: note: Calling '__mlx4_free_mtt_range'
__mlx4_free_mtt_range(dev, offset, order);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: Assuming '__UNIQUE_ID___x352' is <= '__UNIQUE_ID___y353'
seg_order = max_t(int, order - log_mtts_per_seg, 0);
^
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: '?' condition is false
seg_order = max_t(int, order - log_mtts_per_seg, 0);
^
include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
#define max_t(type, x, y) __careful_cmp((type)(x), (type)(y), >)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/net/ethernet/mellanox/mlx4/mr.c:228:21: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
offset + (1 << order) - 1);
^ ~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
^~~~~~~~
drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
^~~~~~~~
Suppressed 78 warnings (78 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
>> drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
^~~~~~~
drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
^~~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
113 warnings generated.
drivers/net/ethernet/broadcom/bcmsysport.c:381:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:381:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:387:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "txq%d_packets", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:387:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "txq%d_packets", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:388:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:388:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:392:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "txq%d_bytes", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:392:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "txq%d_bytes", i);
^~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:393:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:393:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + j * ETH_GSTRING_LEN, buf,
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:543:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:543:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:560:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:560:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:903:21: warning: Value stored to 'ndev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct net_device *ndev = priv->netdev;
^~~~ ~~~~~~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:903:21: note: Value stored to 'ndev' during its initialization is never read
struct net_device *ndev = priv->netdev;
^~~~ ~~~~~~~~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tsb, 0, sizeof(*tsb));
^~~~~~
drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tsb, 0, sizeof(*tsb));
^~~~~~
Suppressed 104 warnings (100 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
114 warnings generated.
net/ipv4/fib_trie.c:419:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
struct key_vector *chi = get_child(tn, i);
^
net/ipv4/fib_trie.c:2021:2: note: Loop condition is true. Entering loop body
for (;;) {
^
net/ipv4/fib_trie.c:2025:3: note: Taking false branch
if (!(cindex--)) {
^
net/ipv4/fib_trie.c:2044:7: note: Assuming the condition is false
n = get_child(pn, cindex);
^
net/ipv4/fib_trie.c:194:26: note: expanded from macro 'get_child'
#define get_child(tn, i) rtnl_dereference((tn)->tnode[i])
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rcupdate.h:594:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rcupdate.h:398:19: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rcupdate.h:319:8: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
net/ipv4/fib_trie.c:2044:7: note: Left side of '&&' is false
n = get_child(pn, cindex);
^
net/ipv4/fib_trie.c:194:26: note: expanded from macro 'get_child'
#define get_child(tn, i) rtnl_dereference((tn)->tnode[i])
^
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/lockdep.h:310:15: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^~~~~~~~~~~
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
net/batman-adv/tvlv.c:189:2: note: Left side of '&&' is false
lockdep_assert_held(&bat_priv->tvlv.container_list_lock);
^
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^
include/linux/lockdep.h:310:27: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^
net/batman-adv/tvlv.c:189:2: note: Loop condition is false. Exiting loop
lockdep_assert_held(&bat_priv->tvlv.container_list_lock);
^
include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
^
include/linux/lockdep.h:310:2: note: expanded from macro 'lockdep_assert'
do { WARN_ON(debug_locks && !(cond)); } while (0)
^
net/batman-adv/tvlv.c:191:6: note: Assuming 'tvlv' is non-null
if (!tvlv)
^~~~~
net/batman-adv/tvlv.c:191:2: note: Taking false branch
if (!tvlv)
^
net/batman-adv/tvlv.c:197:2: note: Calling 'batadv_tvlv_container_put'
batadv_tvlv_container_put(tvlv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:112:7: note: 'tvlv' is non-null
if (!tvlv)
^~~~
net/batman-adv/tvlv.c:112:2: note: Taking false branch
if (!tvlv)
^
net/batman-adv/tvlv.c:115:2: note: Calling 'kref_put'
kref_put(&tvlv->refcount, batadv_tvlv_container_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:6: note: Assuming the condition is true
if (refcount_dec_and_test(&kref->refcount)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kref.h:64:2: note: Taking true branch
if (refcount_dec_and_test(&kref->refcount)) {
^
include/linux/kref.h:65:3: note: Calling 'batadv_tvlv_container_release'
release(kref);
^~~~~~~~~~~~~
net/batman-adv/tvlv.c:102:2: note: Memory is released
kfree(tvlv);
^~~~~~~~~~~
include/linux/kref.h:65:3: note: Returning; memory was released
release(kref);
^~~~~~~~~~~~~
net/batman-adv/tvlv.c:115:2: note: Returning; memory was released
kref_put(&tvlv->refcount, batadv_tvlv_container_release);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:197:2: note: Returning; memory was released via 1st parameter
batadv_tvlv_container_put(tvlv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/batman-adv/tvlv.c:198:2: note: Use of memory after it is freed
batadv_tvlv_container_put(tvlv);
^ ~~~~
net/batman-adv/tvlv.c:248:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:248:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:289:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_buff, *packet_buff, min_packet_len);
^~~~~~
net/batman-adv/tvlv.c:289:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_buff, *packet_buff, min_packet_len);
^~~~~~
net/batman-adv/tvlv.c:341:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:341:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
^~~~~~
net/batman-adv/tvlv.c:631:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
^~~~~~
net/batman-adv/tvlv.c:631:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
^~~~~~
Suppressed 79 warnings (79 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
97 warnings generated.
drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
>> drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-rxtx-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-rxtx-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-sq-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-sq-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s-rbdr-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s-rbdr-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
^~~~~~
include/linux/log2.h:67:13: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << (fls_long(n) - 1);
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1898:2: note: Taking false branch
if (pass1_silicon(nic->pdev))
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1901:2: note: Control jumps to 'case XDP_SETUP_PROG:' at line 1902
switch (xdp->command) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1903:10: note: Calling 'nicvf_xdp_setup'
return nicvf_xdp_setup(nic, xdp->prog);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:6: note: Assuming 'prog' is null
if (prog && dev->mtu > MAX_XDP_MTU) {
^~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:11: note: Left side of '&&' is false
if (prog && dev->mtu > MAX_XDP_MTU) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:6: note: Assuming the condition is false
if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:2: note: Taking false branch
if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:6: note: Assuming 'if_up' is true
if (if_up)
^~~~~
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:2: note: Taking true branch
if (if_up)
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Loop condition is false. Exiting loop
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1884:2: note: expanded from macro 'xchg'
kcsan_mb(); \
^
include/linux/kcsan-checks.h:264:20: note: expanded from macro 'kcsan_mb'
#define kcsan_mb() do { } while (0)
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Control jumps to 'case 8:' at line 1867
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
arch_xchg(__ai_ptr, __VA_ARGS__); \
^
arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
(__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr))); \
^
arch/riscv/include/asm/cmpxchg.h:122:2: note: expanded from macro '__xchg'
switch (size) { \
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Execution continues on line 1867
old_prog = xchg(&nic->xdp_prog, prog);
^
include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
arch_xchg(__ai_ptr, __VA_ARGS__); \
^
arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
(__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr))); \
^
arch/riscv/include/asm/cmpxchg.h:136:3: note: expanded from macro '__xchg'
break; \
^
drivers/net/ethernet/cavium/thunder/nicvf_main.c:1869:6: note: Assuming 'old_prog' is null
if (old_prog)
--
^
include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
return __fls(x) + 1;
^~~~~~~~~~~~~~~~~~~
include/linux/bitops.h:156:9: note: Returning from 'fls64'
return fls64(l);
^~~~~~~~
include/linux/bitops.h:156:2: note: Returning the value 64
return fls64(l);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 101 warnings (101 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
114 warnings generated.
net/ipv4/ah4.c:109:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(daddr, optptr+optlen-4, 4);
^~~~~~
net/ipv4/ah4.c:109:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(daddr, optptr+optlen-4, 4);
^~~~~~
net/ipv4/ah4.c:112:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(optptr, 0, optlen);
^~~~~~
net/ipv4/ah4.c:112:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(optptr, 0, optlen);
^~~~~~
net/ipv4/ah4.c:133:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:133:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:140:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:140:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:190:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ah->auth_data, 0, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:190:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ah->auth_data, 0, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:200:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iph+1, top_iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:200:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iph+1, top_iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:249:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:249:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:256:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:256:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
^~~~~~
net/ipv4/ah4.c:291:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_network_header(skb), work_iph, ihl);
^~~~~~
net/ipv4/ah4.c:291:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_network_header(skb), work_iph, ihl);
^~~~~~
net/ipv4/ah4.c:382:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(work_iph, iph, ihl);
^~~~~~
net/ipv4/ah4.c:382:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(work_iph, iph, ihl);
^~~~~~
net/ipv4/ah4.c:383:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(auth_data, ah->auth_data, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:383:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(auth_data, ah->auth_data, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:384:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ah->auth_data, 0, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:384:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ah->auth_data, 0, ahp->icv_trunc_len);
^~~~~~
net/ipv4/ah4.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_network_header(skb), work_iph, ihl);
^~~~~~
net/ipv4/ah4.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_network_header(skb), work_iph, ihl);
^~~~~~
Suppressed 101 warnings (100 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
87 warnings generated.
>> drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(*data, "rxq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(*data, "rxq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(*data, "txq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(*data, "txq%d: %s", qidx + start_qidx,
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "bgx_rxstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "bgx_rxstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(data, "bgx_txstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(data, "bgx_txstat%d: ", stats);
^~~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, NIC_VF_REG_COUNT);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, NIC_VF_REG_COUNT);
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(channel, 0, sizeof(*channel));
^~~~~~
drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(channel, 0, sizeof(*channel));
^~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
114 warnings generated.
net/core/dst.c:140:2: warning: Value stored to 'dst' is never read [clang-analyzer-deadcode.DeadStores]
dst = dst_destroy(dst);
^ ~~~~~~~~~~~~~~~~
net/core/dst.c:140:2: note: Value stored to 'dst' is never read
dst = dst_destroy(dst);
^ ~~~~~~~~~~~~~~~~
net/core/dst.c:206:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p->metrics, old_p->metrics, sizeof(p->metrics));
^~~~~~
net/core/dst.c:206:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p->metrics, old_p->metrics, sizeof(p->metrics));
^~~~~~
net/core/dst.c:294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst + 1, 0, sizeof(*md_dst) + optslen - sizeof(*dst));
^~~~~~
net/core/dst.c:294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst + 1, 0, sizeof(*md_dst) + optslen - sizeof(*dst));
^~~~~~
Suppressed 111 warnings (111 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
Suppressed 75 warnings (75 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
net/core/neighbour.c:625:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n->primary_key, pkey, key_len);
^~~~~~
net/core/neighbour.c:625:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n->primary_key, pkey, key_len);
^~~~~~
net/core/neighbour.c:771:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n->key, pkey, key_len);
^~~~~~
net/core/neighbour.c:771:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(n->key, pkey, key_len);
^~~~~~
net/core/neighbour.c:1386:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&neigh->ha, lladdr, dev->addr_len);
vim +69 drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c
9c7c85f7ea1fe5 Jonathan Kim 2019-06-19 59
b4a7db71ea0602 Jonathan Kim 2020-09-01 60 static ssize_t amdgpu_pmu_event_show(struct device *dev,
b4a7db71ea0602 Jonathan Kim 2020-09-01 61 struct device_attribute *attr, char *buf)
b4a7db71ea0602 Jonathan Kim 2020-09-01 62 {
b4a7db71ea0602 Jonathan Kim 2020-09-01 63 struct amdgpu_pmu_event_attribute *amdgpu_pmu_attr;
b4a7db71ea0602 Jonathan Kim 2020-09-01 64
b4a7db71ea0602 Jonathan Kim 2020-09-01 65 amdgpu_pmu_attr = container_of(attr, struct amdgpu_pmu_event_attribute,
b4a7db71ea0602 Jonathan Kim 2020-09-01 66 attr);
b4a7db71ea0602 Jonathan Kim 2020-09-01 67
b4a7db71ea0602 Jonathan Kim 2020-09-01 68 if (!amdgpu_pmu_attr->type)
b4a7db71ea0602 Jonathan Kim 2020-09-01 @69 return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
b4a7db71ea0602 Jonathan Kim 2020-09-01 70
b4a7db71ea0602 Jonathan Kim 2020-09-01 71 return sprintf(buf, "%s,type=0x%x\n",
b4a7db71ea0602 Jonathan Kim 2020-09-01 72 amdgpu_pmu_attr->event_str, amdgpu_pmu_attr->type);
b4a7db71ea0602 Jonathan Kim 2020-09-01 73 }
b4a7db71ea0602 Jonathan Kim 2020-09-01 74
:::::: The code at line 69 was first introduced by commit
:::::: b4a7db71ea060218529e6a4c660c37687ecb5669 drm/amdgpu: add per device user friendly xgmi events for vega20
:::::: TO: Jonathan Kim <jonathan.kim@amd.com>
:::::: CC: Alex Deucher <alexander.deucher@amd.com>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2022-03-22 20:20 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-03-22 20:20 [linux-next:master 11491/14215] drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arg kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.