All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
* [linux-next:master 11491/14215] drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arg...
@ 2022-03-22 20:20 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2022-03-22 20:20 UTC (permalink / raw
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 1126547 bytes --]

CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: Linux Memory Management List <linux-mm@kvack.org>
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   f8833a2b23562be2dae91775127c8014c44d8566
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 [11491/14215] Kbuild: move to -std=gnu11
:::::: branch date: 11 hours ago
:::::: commit date: 10 days ago
config: riscv-randconfig-c006-20220321 (https://download.01.org/0day-ci/archive/20220323/202203230414.nrXG75G9-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 85e9b2687a13d1908aa86d1b89c5ce398a06cd39)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install riscv cross compiling tool for clang build
        # apt-get install binutils-riscv64-linux-gnu
        # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
        git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
        # save the config file to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv clang-analyzer 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>


clang-analyzer warnings: (new ones prefixed by >>)
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
           ^~~~~~
   drivers/phy/freescale/phy-fsl-imx8-mipi-dphy.c:331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&priv->cfg, &cfg, sizeof(struct mixel_dphy_cfg));
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   51 warnings generated.
   drivers/gpu/drm/bridge/ti-sn65dsi86.c:891:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(sink_rates, 0, sizeof(sink_rates));
                           ^~~~~~
   drivers/gpu/drm/bridge/ti-sn65dsi86.c:891:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(sink_rates, 0, sizeof(sink_rates));
                           ^~~~~~
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_audio.c:390:2: warning: Value stored to 'value' is never read [clang-analyzer-deadcode.DeadStores]
           value = AZ_REG_READ(AZALIA_F0_CODEC_PIN_CONTROL_HOT_PLUG_CONTROL);
           ^
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_audio.c:390:2: note: Value stored to 'value' is never read
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_link_encoder.c:310:2: warning: Value stored to 'value' is never read [clang-analyzer-deadcode.DeadStores]
           value = REG_READ(DP_DPHY_INTERNAL_CTRL);
           ^
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dce_link_encoder.c:310:2: note: Value stored to 'value' is never read
   Suppressed 53 warnings (53 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
   Suppressed 53 warnings (53 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (56 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   59 warnings generated.
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:38:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cmd, 0, sizeof(cmd));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:38:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cmd, 0, sizeof(cmd));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:45:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&cmd.lock_hw.lock_hw_data.inst_flags, inst_flags, sizeof(struct dmub_hw_lock_inst_flags));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_hw_lock_mgr.c:45:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&cmd.lock_hw.lock_hw_data.inst_flags, inst_flags, sizeof(struct dmub_hw_lock_inst_flags));
           ^~~~~~
   Suppressed 57 warnings (56 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_outbox.c:40:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cmd, 0x0, sizeof(cmd));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/dce/dmub_outbox.c:40:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cmd, 0x0, sizeof(cmd));
           ^~~~~~
   Suppressed 56 warnings (55 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   60 warnings generated.
>> drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
                          ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
                          ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s,type=0x%x\n",
                  ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s,type=0x%x\n",
                  ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
           ^~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
           ^~~~~~~~
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   fs/inode.c:407:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(mapping, 0, sizeof(*mapping));
           ^~~~~~
   fs/inode.c:407:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(mapping, 0, sizeof(*mapping));
           ^~~~~~
   fs/inode.c:419:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(inode, 0, sizeof(*inode));
           ^~~~~~
   fs/inode.c:419:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(inode, 0, sizeof(*inode));
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   30 warnings generated.
   Suppressed 30 warnings (30 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   92 warnings generated.
   fs/file.c:61:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
           ^~~~~~
   fs/file.c:61:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
           ^~~~~~
   fs/file.c:62:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset((char *)nfdt->open_fds + cpy, 0, set);
           ^~~~~~
   fs/file.c:62:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset((char *)nfdt->open_fds + cpy, 0, set);
           ^~~~~~
   fs/file.c:63:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
           ^~~~~~
   fs/file.c:63:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
           ^~~~~~
   fs/file.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset((char *)nfdt->close_on_exec + cpy, 0, set);
           ^~~~~~
   fs/file.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset((char *)nfdt->close_on_exec + cpy, 0, set);
           ^~~~~~
   fs/file.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
           ^~~~~~
   fs/file.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
           ^~~~~~
   fs/file.c:69:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset((char *)nfdt->full_fds_bits + cpy, 0, set);
           ^~~~~~
   fs/file.c:69:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset((char *)nfdt->full_fds_bits + cpy, 0, set);
           ^~~~~~
   fs/file.c:84:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfdt->fd, ofdt->fd, cpy);
           ^~~~~~
   fs/file.c:84:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfdt->fd, ofdt->fd, cpy);
           ^~~~~~
   fs/file.c:85:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset((char *)nfdt->fd + cpy, 0, set);
           ^~~~~~
   fs/file.c:85:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset((char *)nfdt->fd + cpy, 0, set);
           ^~~~~~
   fs/file.c:371:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
           ^~~~~~
   fs/file.c:371:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
--
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:308:6: note: Assuming the condition is false
           if (i2c_transfer(&i2c_bus->adapter, msgs, 2) == 2) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:308:2: note: Taking false branch
           if (i2c_transfer(&i2c_bus->adapter, msgs, 2) == 2) {
           ^
   drivers/gpu/drm/amd/amdgpu/amdgpu_i2c.c:312:3: note: 4th function call argument is an uninitialized value
                   DRM_DEBUG("i2c 0x%02x 0x%02x read failed\n",
                   ^
   include/drm/drm_print.h:526:2: note: expanded from macro 'DRM_DEBUG'
           __drm_dbg(DRM_UT_CORE, fmt, ##__VA_ARGS__)
           ^                             ~~~~~~~~~~~
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   41 warnings generated.
   drivers/gpu/drm/panel/panel-tpo-tpg110.c:43:8: warning: Excessive padding in 'struct tpg110_panel_mode' (8 padding bytes, where 0 is optimal). 
   Optimal fields order: 
   name, 
   mode, 
   magic, 
   bus_flags, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct tpg110_panel_mode {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/panel/panel-tpo-tpg110.c:43:8: note: Excessive padding in 'struct tpg110_panel_mode' (8 padding bytes, where 0 is optimal). Optimal fields order: name, mode, magic, bus_flags, consider reordering the fields or adding explicit padding members
   struct tpg110_panel_mode {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/panel/panel-tpo-tpg110.c:198:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(t, 0, sizeof(t));
           ^~~~~~
   drivers/gpu/drm/panel/panel-tpo-tpg110.c:198:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(t, 0, sizeof(t));
           ^~~~~~
   Suppressed 39 warnings (39 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   51 warnings generated.
   drivers/gpu/drm/bridge/cdns-dsi.c:517:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(dsi_cfg, 0, sizeof(*dsi_cfg));
           ^~~~~~
   drivers/gpu/drm/bridge/cdns-dsi.c:517:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(dsi_cfg, 0, sizeof(*dsi_cfg));
           ^~~~~~
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   51 warnings generated.
   Suppressed 51 warnings (51 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   drivers/misc/cb710/sgbuf2.c:33:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(addr, miter->addr + miter->consumed, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:33:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(addr, miter->addr + miter->consumed, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(addr, 0, left);
           ^~~~~~
   drivers/misc/cb710/sgbuf2.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(addr, 0, left);
           ^~~~~~
   drivers/misc/cb710/sgbuf2.c:108:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(miter->addr, addr, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:108:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(miter->addr, addr, len);
                   ^~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   58 warnings generated.
   drivers/misc/cb710/debug.c:96:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:96:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
>> drivers/misc/cb710/debug.c:96:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:96:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:97:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:97:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:97:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:97:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:98:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:98:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:98:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:98:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   65 warnings generated.
   drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:692:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&gds_info, 0, sizeof(gds_info));
                   ^~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:692:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&gds_info, 0, sizeof(gds_info));
                   ^~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c:720:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&mem, 0, sizeof(mem));
--
   irq_level, 
   phys_reg_addr, 
   idle_mode, 
   max_frame_size, 
   rbuf_fill_level, 
   rx_pio, 
   if_mode, 
   base_clock, 
   xsync, 
   xctrl, 
   init_error, 
   tx_count, 
   dcd_chkcount, 
   cts_chkcount, 
   dsr_chkcount, 
   ri_chkcount, 
   rbuf_count, 
   rbuf_current, 
   rbuf_index, 
   rbuf_fill_index, 
   tbuf_count, 
   tbuf_current, 
   tbuf_start, 
   tmp_rbuf_count, 
   netcount, 
   input_signal_events, 
   icount, 
   rbuf_fill_count, 
   bh_requested, 
   bh_running, 
   irq_requested, 
   irq_occurred, 
   reg_addr_requested, 
   rx_enabled, 
   rx_restart, 
   tx_enabled, 
   tx_active, 
   signals, 
   drop_rts_on_tx_done, 
   device_name, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct slgt_info {
   ~~~~~~~^~~~~~~~~~~
   drivers/tty/synclink_gt.c:212:8: note: Excessive padding in 'struct slgt_info' (46 padding bytes, where 6 is optimal). Optimal fields order: if_ptr, next_device, pdev, gpio_wait_q, irq_flags, reg_addr, tx_buf, flag_buf, bufs, bufs_dma_addr, rbufs, tbufs, tmp_rbuf, port_array, params, lock, netlock, task, status_event_wait_q, event_wait_q, tx_timer, rx_timer, port, magic, port_count, adapter_num, port_num, line, timeout, x_char, read_status_mask, ignore_status_mask, gpio_present, pending_bh, isr_overflow, bus_type, irq_level, phys_reg_addr, idle_mode, max_frame_size, rbuf_fill_level, rx_pio, if_mode, base_clock, xsync, xctrl, init_error, tx_count, dcd_chkcount, cts_chkcount, dsr_chkcount, ri_chkcount, rbuf_count, rbuf_current, rbuf_index, rbuf_fill_index, tbuf_count, tbuf_current, tbuf_start, tmp_rbuf_count, netcount, input_signal_events, icount, rbuf_fill_count, bh_requested, bh_running, irq_requested, irq_occurred, reg_addr_requested, rx_enabled, rx_restart, tx_enabled, tx_active, signals, drop_rts_on_tx_done, device_name, consider reordering the fields or adding explicit padding members
   struct slgt_info {
   ~~~~~~~^~~~~~~~~~~
   drivers/tty/synclink_gt.c:1190:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|RTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1190:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|RTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1192:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|CTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1192:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|CTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1194:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|DTR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1194:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|DTR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1196:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|DSR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1196:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|DSR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1198:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|CD");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1198:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|CD");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1200:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|RI");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1200:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|RI");
                   ^~~~~~
   drivers/tty/synclink_gt.c:2352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&info->icount, 0, sizeof(info->icount));
           ^~~~~~
   drivers/tty/synclink_gt.c:2352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&info->icount, 0, sizeof(info->icount));
           ^~~~~~
   drivers/tty/synclink_gt.c:2515:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info->icount, 0, sizeof(info->icount));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2515:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info->icount, 0, sizeof(info->icount));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2544:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2544:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
                   ^~~~~~
>> drivers/tty/synclink_gt.c:3430:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
           ^~~~~~~
   drivers/tty/synclink_gt.c:3430:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
           ^~~~~~~
   drivers/tty/synclink_gt.c:3507:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3507:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3554:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3554:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
                   ^~~~~~
   drivers/tty/synclink_gt.c:4646:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(p, info->rbufs[i].buf, partial_count);
                                   ^~~~~~
   drivers/tty/synclink_gt.c:4646:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(p, info->rbufs[i].buf, partial_count);
                                   ^~~~~~
   drivers/tty/synclink_gt.c:4820:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(d->buf, buf, count);
                   ^~~~~~
   drivers/tty/synclink_gt.c:4820:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(d->buf, buf, count);
                   ^~~~~~
   drivers/tty/synclink_gt.c:4959:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&params, &info->params, sizeof(params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4959:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&params, &info->params, sizeof(params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4971:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
           ^~~~~~
   drivers/tty/synclink_gt.c:4971:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
           ^~~~~~
   drivers/tty/synclink_gt.c:4999:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&info->params, &params, sizeof(info->params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4999:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&info->params, &params, sizeof(info->params));
           ^~~~~~
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   59 warnings generated.
   drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:50:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&args, 0, sizeof(args));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:50:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&args, 0, sizeof(args));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:70:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(&out, &buf[1], num);
                                   ^~~~~~
   drivers/gpu/drm/amd/amdgpu/atombios_i2c.c:70:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(&out, &buf[1], num);
                                   ^~~~~~
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   58 warnings generated.
   Suppressed 58 warnings (58 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   68 warnings generated.
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:199:50: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
                   return round_up(adev->vm_manager.max_pfn, 1ULL << shift)
                                                                  ^
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3054:26: note: Assuming field 'asic_type' is not equal to CHIP_RAVEN
           bool pte_support_ats = (adev->asic_type == CHIP_RAVEN);
                                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3058:6: note: 'r' is 0
           if (r)
               ^
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3058:2: note: Taking false branch
           if (r)
           ^
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3062:6: note: Calling 'amdgpu_vm_check_clean_reserved'
           r = amdgpu_vm_check_clean_reserved(adev, vm);
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:3022:25: note: Calling 'amdgpu_vm_num_entries'
           unsigned int entries = amdgpu_vm_num_entries(adev, root);
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:19: note: Calling 'amdgpu_vm_level_shift'
           unsigned shift = amdgpu_vm_level_shift(adev,
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:169:2: note: Control jumps to the 'default' case at line 177
           switch (level) {
           ^
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:178:3: note: Returning the value 4294967295
                   return ~0;
                   ^~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:19: note: Returning from 'amdgpu_vm_level_shift'
           unsigned shift = amdgpu_vm_level_shift(adev,
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:194:2: note: 'shift' initialized to 4294967295
           unsigned shift = amdgpu_vm_level_shift(adev,
--
           ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2710:6: note: Assuming the condition is true
           if (RSS_AQ(adapter)) {
               ^
   drivers/net/ethernet/intel/iavf/iavf.h:363:21: note: expanded from macro 'RSS_AQ'
   #define RSS_AQ(_a) ((_a)->vf_res->vf_cap_flags & \
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:2710:2: note: Taking true branch
           if (RSS_AQ(adapter)) {
           ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2734:2: note: Loop condition is true.  Entering loop body
           list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
           ^
   include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
           for (pos = list_first_entry(head, typeof(*pos), member),        \
           ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2735:3: note: Taking true branch
                   if (ether_addr_equal(f->macaddr, adapter->hw.mac.addr)) {
                   ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2737:4: note: Memory is released
                           kfree(f);
                           ^~~~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:2734:2: note: Loop condition is false. Execution continues on line 2741
           list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
           ^
   include/linux/list.h:725:2: note: expanded from macro 'list_for_each_entry_safe'
           for (pos = list_first_entry(head, typeof(*pos), member),        \
           ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2741:2: note: Loop condition is true.  Entering loop body
           list_for_each_entry(f, &adapter->mac_filter_list, list) {
           ^
   include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
           for (pos = list_first_entry(head, typeof(*pos), member);        \
           ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2742:10: note: Use of memory after it is freed
                   f->add = true;
                   ~~~~~~ ^
   drivers/net/ethernet/intel/iavf/iavf_main.c:2847:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(event.msg_buf, 0, IAVF_MAX_AQ_BUF_SIZE);
                           ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:2847:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(event.msg_buf, 0, IAVF_MAX_AQ_BUF_SIZE);
                           ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3455:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&vf->data.tcp_spec.dst_ip, &match.key->dst.s6_addr32,
                   ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3455:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&vf->data.tcp_spec.dst_ip, &match.key->dst.s6_addr32,
                   ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3459:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&vf->data.tcp_spec.src_ip, &match.key->src.s6_addr32,
                   ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3459:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&vf->data.tcp_spec.src_ip, &match.key->src.s6_addr32,
                   ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3556:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&filter->f.mask.tcp_spec, 0, sizeof(struct virtchnl_l4_spec));
           ^~~~~~
   drivers/net/ethernet/intel/iavf/iavf_main.c:3556:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&filter->f.mask.tcp_spec, 0, sizeof(struct virtchnl_l4_spec));
           ^~~~~~
   Suppressed 109 warnings (109 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   127 warnings generated.
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: warning: Value stored to 'num_msix' is never read [clang-analyzer-deadcode.DeadStores]
                   num_msix = adapter->ahw->num_msix;
                   ^          ~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: note: Value stored to 'num_msix' is never read
                   num_msix = adapter->ahw->num_msix;
                   ^          ~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
                   ^~~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(name, "%pM: %s" , adapter->mac_addr,
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(name, "%pM: %s" , adapter->mac_addr,
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nic_info, 0, sizeof(struct qlcnic_info));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nic_info, 0, sizeof(struct qlcnic_info));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: warning: Value stored to 'priv_level' is never read [clang-analyzer-deadcode.DeadStores]
           priv_level = QLC_DEV_GET_DRV(op_mode, adapter->ahw->pci_func);
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: note: Value stored to 'priv_level' is never read
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&nic_info, 0, sizeof(struct qlcnic_info));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&nic_info, 0, sizeof(struct qlcnic_info));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           snprintf(sds_ring->name,
                                           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                           snprintf(sds_ring->name,
                                           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   snprintf(tx_ring->name, sizeof(tx_ring->name),
                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                   snprintf(tx_ring->name, sizeof(tx_ring->name),
                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&adapter->stats, 0, sizeof(adapter->stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&adapter->stats, 0, sizeof(adapter->stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2602:3: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
                   qlcnic_dcb_get_info(adapter->dcb);
                   ^                   ~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:6: note: Assuming 'err' is 0
           if (err)
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:2: note: Taking false branch
           if (err)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:6: note: Assuming the condition is false
           if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:2: note: Taking false branch
           if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: 64 is equal to 64
           err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
                                                       ^
   include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
   #define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
                             ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: '?' condition is true
           err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
                                                       ^
   include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
   #define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
                            ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:6: note: 'err' is 0
           if (err) {
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:2: note: Taking false branch
           if (err) {
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:6: note: Assuming 'err' is 0
           if (err)
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:2: note: Taking false branch
           if (err)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:6: note: Assuming 'ahw' is non-null
           if (!ahw) {
               ^~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:2: note: Taking false branch
--
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2606:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                           strcpy(buf, name);
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(buf + strlen(buf), mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(buf + strlen(buf), mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(buf, mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(buf, mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
                       ^~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
                       ^~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(dump_buf + offset, 0,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(dump_buf + offset, 0,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(hdr, 0, sizeof(*hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(hdr, 0, sizeof(*hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(reg_hdr, 0, sizeof(*reg_hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(reg_hdr, 0, sizeof(*reg_hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(reg_hdr, 0, sizeof(*reg_hdr));
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(reg_hdr, 0, sizeof(*reg_hdr));
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: warning: Value stored to 'byte_buf' is never read [clang-analyzer-deadcode.DeadStores]
           byte_buf += sizeof(signature);
           ^           ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: note: Value stored to 'byte_buf' is never read
           byte_buf += sizeof(signature);
           ^           ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           memcpy(dump_buf + offset,
                                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                           memcpy(dump_buf + offset,
                                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: warning: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). 
   Optimal fields order: 
   desc, 
   vf_desc, 
   type, 
   start_addr, 
   end_addr, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct igu_fifo_addr_data {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: note: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). Optimal fields order: desc, vf_desc, type, start_addr, end_addr, consider reordering the fields or adding explicit padding members
   struct igu_fifo_addr_data {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(dest, source_str, size);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(dest, source_str, size);
           ^~~~~~~
>> drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
                             ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
                             ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                               sprintf(qed_get_buf_ptr
                                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                               sprintf(qed_get_buf_ptr
                                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
--
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_emc.c:430:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if ((sscanf(params, "%u", &argc) != 1) || (argc != 2))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_emc.c:435:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if ((sscanf(p, "%u", &st) != 1) || (st > 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_emc.c:435:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if ((sscanf(p, "%u", &st) != 1) || (st > 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_emc.c:440:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if ((sscanf(p, "%u", &hr) != 1) || (hr > 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_emc.c:440:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if ((sscanf(p, "%u", &hr) != 1) || (hr > 1))
                ^~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   drivers/scsi/device_handler/scsi_dh_alua.c:134:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(cdb, 0x0, MAX_COMMAND_SIZE);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:134:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(cdb, 0x0, MAX_COMMAND_SIZE);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:164:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(stpg_data, 0, stpg_len);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:164:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(stpg_data, 0, stpg_len);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:169:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(cdb, 0x0, MAX_COMMAND_SIZE);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:169:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(cdb, 0x0, MAX_COMMAND_SIZE);
           ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:1056:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if ((sscanf(params, "%u", &argc) != 1) || (argc != 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:1056:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if ((sscanf(params, "%u", &argc) != 1) || (argc != 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:1061:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if ((sscanf(p, "%u", &optimize) != 1) || (optimize > 1))
                ^~~~~~
   drivers/scsi/device_handler/scsi_dh_alua.c:1061:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if ((sscanf(p, "%u", &optimize) != 1) || (optimize > 1))
                ^~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   108 warnings generated.
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, qlcnic_get_regs_len(dev));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, qlcnic_get_regs_len(dev));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data + ETH_ALEN, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data + ETH_ALEN, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, *qlcnic_gstrings_test,
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, *qlcnic_gstrings_test,
                   ^~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx_queue_%d %s", i,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx_queue_%d %s", i,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&tx_stats, 0, sizeof(tx_stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&tx_stats, 0, sizeof(tx_stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0, stats->n_stats * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0, stats->n_stats * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: warning: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index' [clang-analyzer-deadcode.DeadStores]
           for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
                          ^       ~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: note: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index'
           for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
                          ^       ~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
           ^~~~~~
   include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << fls_long(n - 1);
                      ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:6: note: Assuming field 'rx_mini_pending' is 0
           if (ring->rx_mini_pending)
               ^~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:2: note: Taking false branch
           if (ring->rx_mini_pending)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:678:12: note: Calling 'qlcnic_validate_ringparam'
           num_rxd = qlcnic_validate_ringparam(ring->rx_pending,
                     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:654:13: note: Assuming '__UNIQUE_ID___x462' is > '__UNIQUE_ID___y463'
           num_desc = max(val, min);
                      ^
   include/linux/minmax.h:52:19: note: expanded from macro 'max'
   #define max(x, y)       __careful_cmp(x, y, >)
                           ^~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
--
           ^~~~~~~~
   drivers/input/keyboard/newtonkbd.c:81:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(nkbd->phys, sizeof(nkbd->phys), "%s/input0", serio->phys);
           ^~~~~~~~
   drivers/input/keyboard/newtonkbd.c:82:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nkbd->keycode, nkbd_keycode, sizeof(nkbd->keycode));
           ^~~~~~
   drivers/input/keyboard/newtonkbd.c:82:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nkbd->keycode, nkbd_keycode, sizeof(nkbd->keycode));
           ^~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   90 warnings generated.
   net/decnet/dn_dev.c:475:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                           ^~~~~~
   net/decnet/dn_dev.c:475:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                           ^~~~~~
   net/decnet/dn_dev.c:661:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                   ^~~~~~
   net/decnet/dn_dev.c:661:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                   ^~~~~~
   net/decnet/dn_dev.c:848:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(msg->tiver, dn_eco_version, 3);
           ^~~~~~
   net/decnet/dn_dev.c:848:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(msg->tiver, dn_eco_version, 3);
           ^~~~~~
   net/decnet/dn_dev.c:853:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(msg->seed, 0, 8);
           ^~~~~~
   net/decnet/dn_dev.c:853:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(msg->seed, 0, 8);
           ^~~~~~
   net/decnet/dn_dev.c:854:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(msg->neighbor, dn_hiord, ETH_ALEN);
           ^~~~~~
   net/decnet/dn_dev.c:854:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(msg->neighbor, dn_hiord, ETH_ALEN);
           ^~~~~~
   net/decnet/dn_dev.c:864:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(msg->data, 0xAA, 2);
           ^~~~~~
   net/decnet/dn_dev.c:864:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(msg->data, 0xAA, 2);
           ^~~~~~
   net/decnet/dn_dev.c:947:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ptr, 0, 7); /* Name: Reserved */
           ^~~~~~
   net/decnet/dn_dev.c:947:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ptr, 0, 7); /* Name: Reserved */
           ^~~~~~
   net/decnet/dn_dev.c:1093:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&dn_db->parms, p, sizeof(struct dn_dev_parms));
           ^~~~~~
   net/decnet/dn_dev.c:1093:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&dn_db->parms, p, sizeof(struct dn_dev_parms));
           ^~~~~~
   net/decnet/dn_dev.c:1176:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(ifa->ifa_label, dev->name);
           ^~~~~~
   net/decnet/dn_dev.c:1176:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(ifa->ifa_label, dev->name);
           ^~~~~~
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   94 warnings generated.
   Suppressed 94 warnings (94 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   137 warnings generated.
   drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
           ^~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
           ^~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                   strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
                   ^~~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ndata, 0, sizeof(struct octnic_data_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ndata, 0, sizeof(struct octnic_data_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(g->sg, 0, g->sg_size);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(g->sg, 0, g->sg_size);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ivi, 0, sizeof(struct ifla_vf_info));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ivi, 0, sizeof(struct ifla_vf_info));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
--
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
           if (hw->shutting_down) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
           if (hw->shutting_down) {
           ^
   drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
           if (hw->to_setup == 1) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
           if (hw->to_setup == 1) {
           ^
   drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
                           again |= get_packets_from_hw(hw);
                                    ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
           while (hw->rx_ready && !hw->blocking_rx) {
                  ^~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
   drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
           while (hw->rx_ready && !hw->blocking_rx) {
                                  ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true.  Entering loop body
           while (hw->rx_ready && !hw->blocking_rx) {
           ^
   drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
                   do_receive_packet(hw);
                   ^~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
           if (hw->hw_version == HW_VERSION_1) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
           if (hw->hw_version == HW_VERSION_1) {
           ^
   drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
                   if (len > hw->ll_mtu) {
                       ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
                   if (len > hw->ll_mtu) {
                   ^
   drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is < 'len'
                   for (i = 0; i < len; i += 2) {
                               ^~~~~~~
   drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is true.  Entering loop body
                   for (i = 0; i < len; i += 2) {
                   ^
   drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is >= 'len'
                   for (i = 0; i < len; i += 2) {
                               ^~~~~~~
   drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is false. Execution continues on line 902
                   for (i = 0; i < len; i += 2) {
                   ^
   drivers/tty/ipwireless/hardware.c:904:2: note: Calling 'swap_packet_bitfield_from_le'
           swap_packet_bitfield_from_le(pkt);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:904:2: note: Returning from 'swap_packet_bitfield_from_le'
           swap_packet_bitfield_from_le(pkt);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:906:6: note: Assuming 'ipwireless_debug' is not equal to 0
           if (ipwireless_debug)
               ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:906:2: note: Taking true branch
           if (ipwireless_debug)
           ^
   drivers/tty/ipwireless/hardware.c:907:3: note: Calling 'dump_data_bytes'
                   dump_data_bytes("recv", pkt, len);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:369:10: note: Calling 'data_type'
                           type, data_type(data, length));
                                 ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:347:6: note: 'length' is not equal to 0
           if (length == 0)
               ^~~~~~
   drivers/tty/ipwireless/hardware.c:347:2: note: Taking false branch
           if (length == 0)
           ^
   drivers/tty/ipwireless/hardware.c:350:23: note: The left operand of '&' is a garbage value
           if (hdr->packet_rank & NL_FIRST_PACKET) {
               ~~~~~~~~~~~~~~~~ ^
>> drivers/tty/ipwireless/hardware.c:368:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
           ^~~~~~~
   drivers/tty/ipwireless/hardware.c:368:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
           ^~~~~~~
   drivers/tty/ipwireless/hardware.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(pkt.rawpkt + header_size,
           ^~~~~~
   drivers/tty/ipwireless/hardware.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(pkt.rawpkt + header_size,
           ^~~~~~
   drivers/tty/ipwireless/hardware.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(packet, old_packet,
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(packet, old_packet,
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:657:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((unsigned char *)(*assem) +
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:657:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((unsigned char *)(*assem) +
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:679:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:679:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:815:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
           unsigned int protocol = packet->hdr.protocol;
           ^
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
           if (hw->shutting_down) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
           if (hw->shutting_down) {
           ^
   drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
           if (hw->to_setup == 1) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
           if (hw->to_setup == 1) {
           ^
   drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
                           again |= get_packets_from_hw(hw);
                                    ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
           while (hw->rx_ready && !hw->blocking_rx) {
                  ^~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
   drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
           while (hw->rx_ready && !hw->blocking_rx) {
                                  ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true.  Entering loop body
           while (hw->rx_ready && !hw->blocking_rx) {
           ^
   drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
                   do_receive_packet(hw);
                   ^~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
           if (hw->hw_version == HW_VERSION_1) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
           if (hw->hw_version == HW_VERSION_1) {
           ^
   drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
                   if (len > hw->ll_mtu) {
                       ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
--
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:482:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&vf_rep->stats, &stats, sizeof(stats));
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:482:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&vf_rep->stats, &stats, sizeof(stats));
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:519:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(vf_rep, 0, sizeof(*vf_rep));
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:519:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(vf_rep, 0, sizeof(*vf_rep));
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&rep_cfg, 0, sizeof(rep_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&rep_cfg, 0, sizeof(rep_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:641:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(rep_cfg.rep_name.name, ndev->name, LIO_IF_NAME_SIZE);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c:641:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(rep_cfg.rep_name.name, ndev->name, LIO_IF_NAME_SIZE);
           ^~~~~~~
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   9 warnings generated.
   Suppressed 9 warnings (9 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   10 warnings generated.
   drivers/media/dvb-frontends/cxd2880/cxd2880_devio_spi.c:95:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&send_data[3], write_data_top, send_data[2]);
                   ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_devio_spi.c:95:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&send_data[3], write_data_top, send_data[2]);
                   ^~~~~~
   Suppressed 9 warnings (9 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   9 warnings generated.
   Suppressed 9 warnings (9 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   9 warnings generated.
   Suppressed 9 warnings (9 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   drivers/media/dvb-frontends/cxd2880/cxd2880_spi_device.c:27:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&tx, 0, sizeof(tx));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_spi_device.c:27:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&tx, 0, sizeof(tx));
           ^~~~~~
   Suppressed 37 warnings (37 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   55 warnings generated.
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1245:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(data, 0x01, sizeof(data));
                   ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1245:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(data, 0x01, sizeof(data));
                   ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1247:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(data, 0x00, sizeof(data));
                   ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1247:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(data, 0x00, sizeof(data));
                   ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1558:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0x00, sizeof(data));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1558:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0x00, sizeof(data));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1691:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0x00, sizeof(data));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1691:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0x00, sizeof(data));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1924:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tnr_dmd, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1924:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tnr_dmd, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1958:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tnr_dmd_main, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1958:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tnr_dmd_main, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1959:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tnr_dmd_sub, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   drivers/media/dvb-frontends/cxd2880/cxd2880_tnrdmd.c:1959:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tnr_dmd_sub, 0, sizeof(struct cxd2880_tnrdmd));
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   107 warnings generated.
>> drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->bus_info, "%s", pdev->name);
           ^~~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->bus_info, "%s", pdev->name);
           ^~~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
           ^~~~~~
   Suppressed 103 warnings (103 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   110 warnings generated.
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
           offset = CLE_PORT_OFFSET;
           ^
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: note: Value stored to 'offset' is never read
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&kn, 0, sizeof(kn));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&kn, 0, sizeof(kn));
           ^~~~~~
   Suppressed 103 warnings (103 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   95 warnings generated.
   Suppressed 95 warnings (95 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   96 warnings generated.
   net/bridge/br_device.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
           ^~~~~~
   net/bridge/br_device.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(skb->cb, 0, sizeof(struct br_input_skb_cb));
           ^~~~~~
   Suppressed 95 warnings (95 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   100 warnings generated.
   net/bridge/br_fdb.c:217:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
           ^~~~~~
   net/bridge/br_fdb.c:217:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
           ^~~~~~
   net/bridge/br_fdb.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
           ^~~~~~
   net/bridge/br_fdb.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
           ^~~~~~
   net/bridge/br_fdb.c:647:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
           ^~~~~~
   net/bridge/br_fdb.c:647:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
           ^~~~~~
   net/bridge/br_fdb.c:667:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
                       ^~~~~~~
   drivers/misc/cardreader/rtsx_pcr.c:267:3: note: Taking true branch
                   if (err < 0)
                   ^
   drivers/misc/cardreader/rtsx_pcr.c:268:4: note: Returning without writing to '*val'
                           return err;
                           ^
   drivers/misc/cardreader/rtsx_pcr.c:294:9: note: Returning from '__rtsx_pci_read_phy_register'
           return __rtsx_pci_read_phy_register(pcr, addr, val);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cardreader/rtsx_pcr.c:294:2: note: Returning without writing to '*'
           return __rtsx_pci_read_phy_register(pcr, addr, val);
           ^
   drivers/misc/cardreader/rtsx_pcr.c:1253:3: note: Returning from 'rtsx_pci_read_phy_register'
                   rtsx_pci_read_phy_register(pcr, 0x01, &val);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cardreader/rtsx_pcr.c:1254:7: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
                   val &= ~(1<<9);
                   ~~~ ^
   drivers/misc/cardreader/rtsx_pcr.c:1305:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
                   err = rtsx_pci_write_register(pcr, RTS5261_FW_CFG1,
                   ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cardreader/rtsx_pcr.c:1305:3: note: Value stored to 'err' is never read
                   err = rtsx_pci_write_register(pcr, RTS5261_FW_CFG1,
                   ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   66 warnings generated.
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&status, 0, sizeof(struct dpu_danger_safe_status));
           ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&status, 0, sizeof(struct dpu_danger_safe_status));
           ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   Suppressed 63 warnings (63 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   40 warnings generated.
   drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(ret & attr->index));
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(ret & attr->index));
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   37 warnings generated.
   Suppressed 37 warnings (37 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   20 warnings generated.
   Suppressed 20 warnings (20 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   drivers/hwmon/scpi-hwmon.c:109:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "%lld\n", (s64)value);
                          ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:109:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "%lld\n", (s64)value);
                          ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:111:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%llu\n", value);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:111:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%llu\n", value);
                  ^~~~~~~
>> drivers/hwmon/scpi-hwmon.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", sensor->info.name);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", sensor->info.name);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:190:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:190:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:192:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:192:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:197:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:197:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:199:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:199:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:204:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:204:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:206:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:206:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:211:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:211:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:213:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:213:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:218:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:218:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:220:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:220:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   Suppressed 20 warnings (20 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   108 warnings generated.
   Suppressed 108 warnings (108 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   120 warnings generated.
   net/ipv4/ip_tunnel.c:249:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(name, ops->kind);
                   ^~~~~~
   net/ipv4/ip_tunnel.c:249:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(name, ops->kind);
                   ^~~~~~
   net/ipv4/ip_tunnel.c:250:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(name, "%d");
                   ^~~~~~
   net/ipv4/ip_tunnel.c:250:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(name, "%d");
                   ^~~~~~
   net/ipv4/ip_tunnel.c:466:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&t->encap, 0, sizeof(t->encap));
           ^~~~~~
   net/ipv4/ip_tunnel.c:466:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&t->encap, 0, sizeof(t->encap));
           ^~~~~~
   net/ipv4/ip_tunnel.c:562:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
           ^~~~~~
   net/ipv4/ip_tunnel.c:562:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
           ^~~~~~
   net/ipv4/ip_tunnel.c:655:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
           ^~~~~~
   net/ipv4/ip_tunnel.c:655:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
--
           ^~~~~~
   drivers/message/fusion/mptbase.c:5885:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5931:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5931:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5933:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5933:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5934:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&sas_address,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5934:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&sas_address,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5937:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&phys_disk->Path[i].OwnerWWID,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5937:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&phys_disk->Path[i].OwnerWWID,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:6082:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(mem, (u8 *)pIoc3, iocpage3sz);
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6082:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(mem, (u8 *)pIoc3, iocpage3sz);
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6243:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6243:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6269:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6269:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6271:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6271:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&evn, 0, sizeof(EventNotification_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&evn, 0, sizeof(EventNotification_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
           ^~~~~~
   drivers/message/fusion/mptbase.c:6396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
           ^~~~~~
   drivers/message/fusion/mptbase.c:6787:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, " (Exp %02d%02d)",
                   ^~~~~~~
   drivers/message/fusion/mptbase.c:6787:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, " (Exp %02d%02d)",
                   ^~~~~~~
   drivers/message/fusion/mptbase.c:6793:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcat(buf, " [MDBG]");
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6793:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                           strcat(buf, " [MDBG]");
                           ^~~~~~
>> drivers/message/fusion/mptbase.c:6820:6: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
               ^~~~~~~
   drivers/message/fusion/mptbase.c:6820:6: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
               ^~~~~~~
   drivers/message/fusion/mptbase.c:6831:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6831:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6834:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6834:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6837:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   y += sprintf(buffer+len+y, " (disabled)");
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6837:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   y += sprintf(buffer+len+y, " (disabled)");
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6839:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y += sprintf(buffer+len+y, "\n");
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6839:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y += sprintf(buffer+len+y, "\n");
                ^~~~~~~
   drivers/message/fusion/mptbase.c:7025:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7025:2: note: Value stored to 'time_count' is never read
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7174:3: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
                   time_count = jiffies;
                   ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7174:3: note: Value stored to 'time_count' is never read
                   time_count = jiffies;
                   ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7197:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7197:2: note: Value stored to 'time_count' is never read
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7787:8: warning: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii' [clang-analyzer-deadcode.DeadStores]
                   if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
                        ^    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptbase.c:7787:8: note: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii'
                   if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
                        ^    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptbase.c:8175:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(extend_desc, EVENT_DESCR_STR_SZ,
           ^~~~~~~~
   drivers/message/fusion/mptbase.c:8175:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(extend_desc, EVENT_DESCR_STR_SZ,
           ^~~~~~~~
   Suppressed 56 warnings (50 in non-user code, 6 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   81 warnings generated.
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   47 warnings generated.
   drivers/media/rc/rc-main.c:292:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(newscan, rc_map->scan, rc_map->len * sizeof(struct rc_map_table));
           ^~~~~~
   drivers/media/rc/rc-main.c:292:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(newscan, rc_map->scan, rc_map->len * sizeof(struct rc_map_table));
           ^~~~~~
   drivers/media/rc/rc-main.c:326:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(&rc_map->scan[index], &rc_map->scan[index+ 1],
                   ^~~~~~~
   drivers/media/rc/rc-main.c:326:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(&rc_map->scan[index], &rc_map->scan[index+ 1],
                   ^~~~~~~
   drivers/media/rc/rc-main.c:389:32: warning: The left operand of '==' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
                   if (rc_map->scan[i].scancode == scancode)
                                                ^
   drivers/media/rc/rc-main.c:1999:6: note: Assuming 'dr' is non-null
           if (!dr)
               ^~~
   drivers/media/rc/rc-main.c:1999:2: note: Taking false branch
           if (!dr)
           ^
   drivers/media/rc/rc-main.c:2002:8: note: Calling 'rc_register_device'
           ret = rc_register_device(dev);
--
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1536:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&vram_paddrs, 0, sizeof(vram_paddrs));
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1536:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&vram_paddrs, 0, sizeof(vram_paddrs));
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1554:3: warning: Value stored to 'rg' is never read [clang-analyzer-deadcode.DeadStores]
                   rg = ofbi->region;
                   ^    ~~~~~~~~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1554:3: note: Value stored to 'rg' is never read
                   rg = ofbi->region;
                   ^    ~~~~~~~~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1634:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&new_var, &fbi->var, sizeof(new_var));
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1634:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&new_var, &fbi->var, sizeof(new_var));
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1638:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&fbi->var, &new_var, sizeof(fbi->var));
                   ^~~~~~
   drivers/video/fbdev/omap2/omapfb/omapfb-main.c:1638:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&fbi->var, &new_var, sizeof(fbi->var));
                   ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   77 warnings generated.
   drivers/net/phy/nxp-c45-tja11xx.c:438:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                   ^~~~~~
   drivers/net/phy/nxp-c45-tja11xx.c:438:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                   ^~~~~~
   drivers/net/phy/nxp-c45-tja11xx.c:845:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   strncpy(data + i * ETH_GSTRING_LEN,
                   ^~~~~~~
   drivers/net/phy/nxp-c45-tja11xx.c:845:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                   strncpy(data + i * ETH_GSTRING_LEN,
                   ^~~~~~~
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   77 warnings generated.
   drivers/net/phy/nxp-tja11xx.c:365:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   strncpy(data + i * ETH_GSTRING_LEN,
                   ^~~~~~~
   drivers/net/phy/nxp-tja11xx.c:365:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                   strncpy(data + i * ETH_GSTRING_LEN,
                   ^~~~~~~
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   77 warnings generated.
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   75 warnings generated.
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   181 warnings generated.
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
                 ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
                 ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf((char *)bytes,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf((char *)bytes,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_priv_flags_strings[i]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_priv_flags_strings[i]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_vf_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_vf_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(resp, 0, sizeof(struct oct_intrmod_resp));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(resp, 0, sizeof(struct oct_intrmod_resp));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
           ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: note: Value stored to 'ret' is never read
           ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
                  ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
--
           ^
   drivers/net/ethernet/agere/et131x.c:3941:6: note: Assuming 'rc' is >= 0
           if (rc < 0)
               ^~~~~~
   drivers/net/ethernet/agere/et131x.c:3941:2: note: Taking false branch
           if (rc < 0)
           ^
   drivers/net/ethernet/agere/et131x.c:3946:6: note: Assuming field 'regs' is non-null
           if (!adapter->regs) {
               ^~~~~~~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:3946:2: note: Taking false branch
           if (!adapter->regs) {
           ^
   drivers/net/ethernet/agere/et131x.c:3958:7: note: Calling 'et131x_adapter_memory_alloc'
           rc = et131x_adapter_memory_alloc(adapter);
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:3125:6: note: 'status' is 0
           if (status) {
               ^~~~~~
   drivers/net/ethernet/agere/et131x.c:3125:2: note: Taking false branch
           if (status) {
           ^
   drivers/net/ethernet/agere/et131x.c:3133:6: note: 'status' is -12
           if (status) {
               ^~~~~~
   drivers/net/ethernet/agere/et131x.c:3133:2: note: Taking true branch
           if (status) {
           ^
   drivers/net/ethernet/agere/et131x.c:3134:3: note: Loop condition is false.  Exiting loop
                   dev_err(&adapter->pdev->dev,
                   ^
   include/linux/dev_printk.h:144:2: note: expanded from macro 'dev_err'
           dev_printk_index_wrap(_dev_err, KERN_ERR, dev, dev_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
                   dev_printk_index_emit(level, fmt);                      \
                   ^
   include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
           printk_index_subsys_emit("%s %s: ", level, fmt)
           ^
   include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
           __printk_index_emit(fmt, level, subsys_fmt_prefix)
           ^
   include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
   #define __printk_index_emit(...) do {} while (0)
                                    ^
   drivers/net/ethernet/agere/et131x.c:3136:3: note: Calling 'et131x_adapter_memory_free'
                   et131x_adapter_memory_free(adapter);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:3117:2: note: Calling 'et131x_rx_dma_memory_free'
           et131x_rx_dma_memory_free(adapter);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:2013:10: note: Assuming field 'num_ready_recv' is equal to field 'num_rfd'
           WARN_ON(rx_ring->num_ready_recv != rx_ring->num_rfd);
                   ^
   include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
           int __ret_warn_on = !!(condition);                              \
                                  ^~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:2015:2: note: Loop condition is true.  Entering loop body
           while (!list_empty(&rx_ring->recv_list)) {
           ^
   drivers/net/ethernet/agere/et131x.c:2021:3: note: Memory is released
                   kfree(rfd);
                   ^~~~~~~~~~
   drivers/net/ethernet/agere/et131x.c:2015:2: note: Loop condition is true.  Entering loop body
           while (!list_empty(&rx_ring->recv_list)) {
           ^
   drivers/net/ethernet/agere/et131x.c:2019:3: note: Calling 'list_del'
                   list_del(&rfd->list_node);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/list.h:149:14: note: Use of memory after it is freed
           entry->next = LIST_POISON1;
           ~~~~~~~~~~~ ^
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   164 warnings generated.
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(content, ' ', len);
           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(content, ' ', len);
           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           strncpy(pos, result[i], strlen(result[i]));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                           strncpy(pos, result[i], strlen(result[i]));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           strncpy(pos, items[i].name, strlen(items[i].name));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                           strncpy(pos, items[i].name, strlen(items[i].name));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%d", i);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%d", i);
           ^~~~~~~
>> drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s", dim_state_str[dim->state]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s", dim_state_str[dim->state]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->profile_ix);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->profile_ix);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s",
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s",
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->steps_left);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->steps_left);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->steps_right);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->steps_right);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->tired);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->tired);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", coal->int_gl);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", coal->int_gl);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", coal->int_ql);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", coal->int_ql);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", reg_val);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", reg_val);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%u", reg_val);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%u", reg_val);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "NA");
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "NA");
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%8u", i);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%8u", i);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%9u", ring->tx_copybreak);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%9u", ring->tx_copybreak);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->len);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->len);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->next_to_use);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->next_to_use);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->next_to_clean);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->next_to_clean);
--
                           ^~~~~~~
   net/ipv4/devinet.c:1498:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcat(ifa->ifa_label, dot);
                           ^~~~~~
   net/ipv4/devinet.c:1498:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                           strcat(ifa->ifa_label, dot);
                           ^~~~~~
   net/ipv4/devinet.c:1500:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
                           ^~~~~~
   net/ipv4/devinet.c:1500:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                           strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
                           ^~~~~~
   net/ipv4/devinet.c:1542:5: warning: Value stored to 'in_dev' is never read [clang-analyzer-deadcode.DeadStores]
                                   in_dev = inetdev_init(dev);
                                   ^        ~~~~~~~~~~~~~~~~~
   net/ipv4/devinet.c:1542:5: note: Value stored to 'in_dev' is never read
                                   in_dev = inetdev_init(dev);
                                   ^        ~~~~~~~~~~~~~~~~~
   net/ipv4/devinet.c:1567:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1567:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:2683:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(all, current->nsproxy->net_ns->ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2683:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(all, current->nsproxy->net_ns->ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2685:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2685:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2691:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(all, init_net.ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2691:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(all, init_net.ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2693:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(dflt, init_net.ipv4.devconf_dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2693:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(dflt, init_net.ipv4.devconf_dflt,
                           ^~~~~~
   Suppressed 101 warnings (101 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   42 warnings generated.
   drivers/hwmon/mc13783-adc.c:37:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", priv->name);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:37:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", priv->name);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:87:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:87:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:106:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:106:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:128:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:128:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", val);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", ret);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", ret);
                  ^~~~~~~
   drivers/hwmon/mc13783-adc.c:239:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(priv->name, ARRAY_SIZE(priv->name), "%s", id->name);
           ^~~~~~~~
   drivers/hwmon/mc13783-adc.c:239:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(priv->name, ARRAY_SIZE(priv->name), "%s", id->name);
           ^~~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   drivers/md/dm-log-userspace-base.c:148:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
                      ^~~~~~~
   drivers/md/dm-log-userspace-base.c:148:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
                      ^~~~~~~
>> drivers/md/dm-log-userspace-base.c:150:15: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   str_size += sprintf(str + str_size, " %s", argv[i]);
                               ^~~~~~~
   drivers/md/dm-log-userspace-base.c:150:15: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   str_size += sprintf(str + str_size, " %s", argv[i]);
                               ^~~~~~~
   drivers/md/dm-log-userspace-base.c:226:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(lc->uuid, argv[0], DM_UUID_LEN);
           ^~~~~~~
   drivers/md/dm-log-userspace-base.c:226:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(lc->uuid, argv[0], DM_UUID_LEN);
           ^~~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   88 warnings generated.
   drivers/md/dm-log-userspace-transfer.c:61:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(msg, 0, sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:61:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(msg, 0, sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:119:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(pkg->data, tfr->data, tfr->data_size);
                           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:119:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(pkg->data, tfr->data, tfr->data_size);
                           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:201:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tfr->uuid, uuid, DM_UUID_LEN);
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:201:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(tfr->uuid, uuid, DM_UUID_LEN);
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:215:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(tfr->data, data, data_size);
                   ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:215:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(tfr->data, data, data_size);
                   ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:217:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&pkg, 0, sizeof(pkg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:217:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&pkg, 0, sizeof(pkg));
           ^~~~~~
   Suppressed 82 warnings (82 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   143 warnings generated.
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:660:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(buff, ETH_GSTRING_LEN, "%s", strs[i].desc);
                   ^~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:660:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(buff, ETH_GSTRING_LEN, "%s", strs[i].desc);
                   ^~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:771:3: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
                   p = hclge_comm_tqps_get_strings(handle, p);
                   ^   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:771:3: note: Value stored to 'p' is never read
                   p = hclge_comm_tqps_get_strings(handle, p);
                   ^   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:774:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_APP],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:774:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_APP],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:779:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_SERIAL_SERDES],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:779:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_SERIAL_SERDES],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:784:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(p,
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:784:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(p,
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:790:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_PHY],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:790:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(p, hns3_nic_test_strs[HNAE3_LOOP_PHY],
                           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:792:4: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
                           p += ETH_GSTRING_LEN;
                           ^
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:792:4: note: Value stored to 'p' is never read
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:805:2: warning: Value stored to 'p' is never read [clang-analyzer-deadcode.DeadStores]
           p = hclge_comm_tqps_get_stats(handle, p);
           ^   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:805:2: note: Value stored to 'p' is never read
           p = hclge_comm_tqps_get_stats(handle, p);
           ^   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c:3575:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
--
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:1352:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(sky2->rx_le, 0, RX_LE_BYTES);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3392:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3392:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3497:9: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
                   imask |= portirq_msk[i];
                         ^
   drivers/net/ethernet/marvell/sky2.c:3517:2: note: Calling 'sky2_all_up'
           sky2_all_up(hw);
           ^~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3488:29: note: The value 2 is assigned to 'i'
           for (i = 0; i < hw->ports; i++) {
                                      ^~~
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3497:9: note: Assigned value is garbage or undefined
                   imask |= portirq_msk[i];
                         ^  ~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3804:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + i * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3804:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + i * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3855:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(filter, 0, sizeof(filter));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3855:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(filter, 0, sizeof(filter));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3863:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(filter, 0xff, sizeof(filter));
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3863:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(filter, 0xff, sizeof(filter));
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4256:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(p, 0, 128);
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4256:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(p, 0, 128);
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4681:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4681:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4772:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4772:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4774:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(buf, sz, "(chip %#x)", chipid);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4774:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(buf, sz, "(chip %#x)", chipid);
                   ^~~~~~~~
>> drivers/net/ethernet/marvell/sky2.c:4896:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
           ^~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4896:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
           ^~~~~~~
   include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << fls_long(n - 1);
                      ^
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Assuming the condition is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
   drivers/net/ethernet/marvell/sky2.c:4173:6: note: Assuming field 'rx_pending' is >= 8
               ering->rx_pending < 8 ||
               ^~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^
   drivers/net/ethernet/marvell/sky2.c:4174:6: note: Assuming the condition is false
               ering->tx_pending < TX_MIN_PENDING ||
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^
   drivers/net/ethernet/marvell/sky2.c:4175:6: note: Assuming field 'tx_pending' is <= TX_MAX_PENDING
               ering->tx_pending > TX_MAX_PENDING)
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:2: note: Taking false branch
           if (ering->rx_pending > RX_MAX_PENDING ||
           ^
   drivers/net/ethernet/marvell/sky2.c:4182:23: note: Calling 'roundup_ring_size'
           sky2->tx_ring_size = roundup_ring_size(sky2->tx_pending);
                                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4148:20: note: '?' condition is false
           return max(128ul, roundup_pow_of_two(pending+1));
                             ^
   include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
           __builtin_constant_p(n) ? (             \
           ^
   drivers/net/ethernet/marvell/sky2.c:4148:20: note: Calling '__roundup_pow_of_two'
           return max(128ul, roundup_pow_of_two(pending+1));
                             ^
   include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
           __roundup_pow_of_two(n)                 \
           ^
   include/linux/minmax.h:52:36: note: expanded from macro 'max'
   #define max(x, y)       __careful_cmp(x, y, >)
                           ~~~~~~~~~~~~~~~~~^~~~~
   include/linux/minmax.h:38:17: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:32:25: note: expanded from macro '__cmp_once'
                   typeof(y) unique_y = (y);               \
                                         ^
   include/linux/log2.h:57:16: note: Calling 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/bitops.h:154:2: note: Taking false branch
           if (sizeof(l) == 4)
           ^
   include/linux/bitops.h:156:9: note: Calling 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/asm-generic/bitops/fls64.h:29:6: note: 'x' is not equal to 0
           if (x == 0)
               ^
   include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
           if (x == 0)
           ^
   include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
           return __fls(x) + 1;
           ^~~~~~~~~~~~~~~~~~~
   include/linux/bitops.h:156:9: note: Returning from 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/linux/bitops.h:156:2: note: Returning the value 64
           return fls64(l);
           ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:16: note: Returning from 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
           return 1UL << fls_long(n - 1);
                      ^  ~~~~~~~~~~~~~~~
   Suppressed 101 warnings (101 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   drivers/hwmon/adc128d818.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", val);
                  ^~~~~~~
   drivers/hwmon/adc128d818.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", val);
                  ^~~~~~~
   drivers/hwmon/adc128d818.c:199:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", temp * 500);/* 0.5 degrees C resolution */
                  ^~~~~~~
   drivers/hwmon/adc128d818.c:199:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", temp * 500);/* 0.5 degrees C resolution */
                  ^~~~~~~
   drivers/hwmon/adc128d818.c:218:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
--
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   drivers/comedi/drivers/mite.c:686:13: warning: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'desc') [clang-analyzer-core.NullDereference]
           desc->next = cpu_to_le32(ring->dma_addr);
                      ^
   drivers/comedi/drivers/mite.c:724:6: note: Assuming field 'prealloc_bufsz' is not equal to 0
           if (async->prealloc_bufsz == 0)
               ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:724:2: note: Taking false branch
           if (async->prealloc_bufsz == 0)
           ^
   drivers/comedi/drivers/mite.c:732:6: note: Assuming 'descs' is non-null
           if (!descs) {
               ^~~~~~
   drivers/comedi/drivers/mite.c:732:2: note: Taking false branch
           if (!descs) {
           ^
   drivers/comedi/drivers/mite.c:740:9: note: Calling 'mite_init_ring_descriptors'
           return mite_init_ring_descriptors(ring, s, n_links << PAGE_SHIFT);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:654:2: note: 'desc' initialized to a null pointer value
           struct mite_dma_desc *desc = NULL;
           ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:659:2: note: Taking false branch
           dev_dbg(s->device->class_dev,
           ^
   include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
           if (0)                                                          \
           ^
   drivers/comedi/drivers/mite.c:662:23: note: Assuming 'remainder' is <= 0
           if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
                                ^~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:662:23: note: '?' condition is false
   drivers/comedi/drivers/mite.c:662:6: note: Assuming the condition is false
           if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:662:2: note: Taking false branch
           if ((n_full_links + (remainder > 0 ? 1 : 0)) > ring->n_links) {
           ^
   drivers/comedi/drivers/mite.c:669:14: note: Assuming 'i' is >= 'n_full_links'
           for (i = 0; i < n_full_links; ++i) {
                       ^~~~~~~~~~~~~~~~
   drivers/comedi/drivers/mite.c:669:2: note: Loop condition is false. Execution continues on line 678
           for (i = 0; i < n_full_links; ++i) {
           ^
   drivers/comedi/drivers/mite.c:678:6: note: 'remainder' is <= 0
           if (remainder > 0) {
               ^~~~~~~~~
   drivers/comedi/drivers/mite.c:678:2: note: Taking false branch
           if (remainder > 0) {
           ^
   drivers/comedi/drivers/mite.c:686:13: note: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'desc')
           desc->next = cpu_to_le32(ring->dma_addr);
           ~~~~       ^
   drivers/comedi/drivers/mite.c:841:3: warning: Value stored to 'wpdep' is never read [clang-analyzer-deadcode.DeadStores]
                   wpdep = BIT(wpdep);
                   ^
   drivers/comedi/drivers/mite.c:841:3: note: Value stored to 'wpdep' is never read
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   drivers/extcon/extcon-rt8973a.c:25:8: warning: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). 
   Optimal fields order: 
   name, 
   irq, 
   virq, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct muic_irq {
   ~~~~~~~^~~~~~~~~~
   drivers/extcon/extcon-rt8973a.c:25:8: note: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). Optimal fields order: name, irq, virq, consider reordering the fields or adding explicit padding members
   struct muic_irq {
   ~~~~~~~^~~~~~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   drivers/vme/bridges/vme_tsi148.c:739:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&image->bus_resource, 0, sizeof(image->bus_resource));
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:739:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&image->bus_resource, 0, sizeof(image->bus_resource));
                   ^~~~~~
>> drivers/vme/bridges/vme_tsi148.c:754:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
           ^~~~~~~
   drivers/vme/bridges/vme_tsi148.c:754:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
           ^~~~~~~
   drivers/vme/bridges/vme_tsi148.c:786:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:786:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:1217:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1217:4: note: Value stored to 'done' is never read
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1237:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1237:3: note: Value stored to 'done' is never read
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1302:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1302:4: note: Value stored to 'done' is never read
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1322:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1322:3: note: Value stored to 'done' is never read
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&entry->descriptor, 0, sizeof(entry->descriptor));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:1652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&entry->descriptor, 0, sizeof(entry->descriptor));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2338:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(tsi148_bridge->name, driver_name);
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2338:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(tsi148_bridge->name, driver_name);
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2367:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&tsi148_device->flush_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2367:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&tsi148_device->flush_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2391:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&master_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2391:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&master_image->bus_resource, 0,
                   ^~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   119 warnings generated.
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:69:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", bridged_mode);
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:69:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", bridged_mode);
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:92:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(adapter->flags & QLCNIC_DIAG_ENABLED));
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:92:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(adapter->flags & QLCNIC_DIAG_ENABLED));
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:167:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&beacon, buf, sizeof(u16));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:167:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&beacon, buf, sizeof(u16));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:242:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", adapter->ahw->beacon_state);
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:242:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", adapter->ahw->beacon_state);
                  ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:329:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(buf, &data, size);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:329:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(buf, &data, size);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_sysfs.c:349:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&data, buf, size);
--
   39 warnings generated.
   drivers/hwmon/pc87427.c:393:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%lu\n", fan_from_reg(data->fan[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:393:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%lu\n", fan_from_reg(data->fan[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:402:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%lu\n", fan_from_reg(data->fan_min[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:402:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%lu\n", fan_from_reg(data->fan_min[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:411:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->fan_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:411:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->fan_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:421:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->fan_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:421:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->fan_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:574:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", pwm_enable);
                  ^~~~~~~
   drivers/hwmon/pc87427.c:574:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", pwm_enable);
                  ^~~~~~~
   drivers/hwmon/pc87427.c:605:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", (int)data->pwm[nr]);
                  ^~~~~~~
   drivers/hwmon/pc87427.c:605:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", (int)data->pwm[nr]);
                  ^~~~~~~
   drivers/hwmon/pc87427.c:697:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%ld\n", temp_from_reg(data->temp[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:697:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%ld\n", temp_from_reg(data->temp[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:706:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_min[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:706:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_min[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:715:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_max[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:715:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_max[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:724:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_crit[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:724:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%ld\n", temp_from_reg8(data->temp_crit[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:733:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", temp_type_from_reg(data->temp_type[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:733:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", temp_type_from_reg(data->temp_type[nr]));
                  ^~~~~~~
   drivers/hwmon/pc87427.c:743:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:743:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:754:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:754:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:765:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:765:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:775:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:775:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(data->temp_status[nr]
                  ^~~~~~~
   drivers/hwmon/pc87427.c:926:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   drivers/hwmon/pc87427.c:926:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   Suppressed 23 warnings (23 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
>> drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(name, "qcom,hdmi-tx-%s", name3))
                               ^~~~~~
   drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(name, "qcom,hdmi-tx-%s", name3))
                               ^~~~~~
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
   drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
           ^~~~~~~~
   drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
           ^~~~~~~~
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   81 warnings generated.
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   25 warnings generated.
   drivers/platform/mellanox/mlxreg-io.c:124:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", regval);
                  ^~~~~~~
   drivers/platform/mellanox/mlxreg-io.c:124:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", regval);
                  ^~~~~~~
   drivers/platform/mellanox/mlxreg-io.c:183:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&priv->mlxreg_io_dev_attr[i].dev_attr,
                   ^~~~~~
   drivers/platform/mellanox/mlxreg-io.c:183:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&priv->mlxreg_io_dev_attr[i].dev_attr,
                   ^~~~~~
   Suppressed 23 warnings (23 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   43 warnings generated.
   drivers/mailbox/bcm-pdc-mailbox.c:497:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(spu_stats_name, 16, "pdc%d_stats", pdcs->pdc_idx);
           ^~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:497:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(spu_stats_name, 16, "pdc%d_stats", pdcs->pdc_idx);
           ^~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:523:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:523:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:551:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:551:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:989:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:989:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = &pdcs->pdev->dev;
                          ^~~   ~~~~~~~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1012:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&pdcs->tx_ring_alloc, &tx, sizeof(tx));
           ^~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1012:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&pdcs->tx_ring_alloc, &tx, sizeof(tx));
           ^~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1013:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&pdcs->rx_ring_alloc, &rx, sizeof(rx));
           ^~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1013:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&pdcs->rx_ring_alloc, &rx, sizeof(rx));
           ^~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1287:2: warning: Value stored to 'dev' is never read [clang-analyzer-deadcode.DeadStores]
           dev = &pdev->dev;
           ^     ~~~~~~~~~~
   drivers/mailbox/bcm-pdc-mailbox.c:1287:2: note: Value stored to 'dev' is never read
           dev = &pdev->dev;
           ^     ~~~~~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
                ^
   drivers/atm/iphase.c:1876:13: note: Assuming field 'traffic_class' is equal to ATM_CBR
           } else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:1876:9: note: Taking true branch
           } else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
                  ^
   drivers/atm/iphase.c:1877:17: note: Taking false branch
                   if (iadev->phy_type & FE_25MBIT_PHY) {
                   ^
   drivers/atm/iphase.c:1881:21: note: Assuming field 'max_pcr' is <= field 'LineRate'
                   if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:1881:17: note: Taking false branch
                   if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
                   ^
   drivers/atm/iphase.c:1887:28: note: Calling 'ia_cbr_setup'
                   if ((ret = ia_cbr_setup (iadev, vcc)) < 0) {     
                              ^~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:474:8: note: Assuming field 'max_pcr' is > 0
      if (vcc->qos.txtp.max_pcr <= 0) {
          ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:474:4: note: Taking false branch
      if (vcc->qos.txtp.max_pcr <= 0) {
      ^
   drivers/atm/iphase.c:479:4: note: Value assigned to 'entries'
      entries = rate / dev->Granularity;
      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:480:4: note: Assuming the condition is false
      IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
      ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                           ^~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:480:4: note: Taking false branch
      IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
      ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:482:8: note: Assuming 'entries' is < 1
      if (entries < 1)
          ^~~~~~~~~~~
   drivers/atm/iphase.c:482:4: note: Taking true branch
      if (entries < 1)
      ^
   drivers/atm/iphase.c:483:7: note: Taking false branch
         IF_CBR(printk("CBR: Bandwidth smaller than granularity of CBR table\n");) 
         ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:486:8: note: Assuming the condition is false
      if (3*(rate - rateLow) > (rateHigh - rate))
          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:486:4: note: Taking false branch
      if (3*(rate - rateLow) > (rateHigh - rate))
      ^
   drivers/atm/iphase.c:488:8: note: 'entries' is <= field 'CbrRemEntries'
      if (entries > dev->CbrRemEntries) {
          ^~~~~~~
   drivers/atm/iphase.c:488:4: note: Taking false branch
      if (entries > dev->CbrRemEntries) {
      ^
   drivers/atm/iphase.c:502:33: note: Division by zero
      spacing = dev->CbrTotEntries / entries;
                ~~~~~~~~~~~~~~~~~~~^~~~~~~~~
   drivers/atm/iphase.c:534:7: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
         memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
         ^~~~~~
   drivers/atm/iphase.c:534:7: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
         memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
         ^~~~~~
   drivers/atm/iphase.c:545:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC)); 
             ^~~~~~
   drivers/atm/iphase.c:545:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC)); 
             ^~~~~~
   drivers/atm/iphase.c:559:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
             ^~~~~~
   drivers/atm/iphase.c:559:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
             ^~~~~~
   drivers/atm/iphase.c:562:8: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
          memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
          ^~~~~~
   drivers/atm/iphase.c:562:8: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
          memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
          ^~~~~~
>> drivers/atm/iphase.c:985:17: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           pBuf += sprintf( pBuf, "%s", prefix );
                   ^~~~~~~
   drivers/atm/iphase.c:985:17: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           pBuf += sprintf( pBuf, "%s", prefix );
                   ^~~~~~~
   drivers/atm/iphase.c:988:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   pBuf += sprintf( pBuf, " " );
                           ^~~~~~~
   drivers/atm/iphase.c:988:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   pBuf += sprintf( pBuf, " " );
                           ^~~~~~~
   drivers/atm/iphase.c:989:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
               pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
                       ^~~~~~~
   drivers/atm/iphase.c:989:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
               pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
                       ^~~~~~~
   drivers/atm/iphase.c:993:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf( pBuf, " " );
                   ^~~~~~~
   drivers/atm/iphase.c:993:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf( pBuf, " " );
                   ^~~~~~~
   drivers/atm/iphase.c:994:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
               pBuf += sprintf( pBuf, "   " );
                       ^~~~~~~
   drivers/atm/iphase.c:994:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
               pBuf += sprintf( pBuf, "   " );
                       ^~~~~~~
   drivers/atm/iphase.c:996:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           pBuf += sprintf( pBuf, "  " );
                   ^~~~~~~
   drivers/atm/iphase.c:996:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           pBuf += sprintf( pBuf, "  " );
                   ^~~~~~~
   drivers/atm/iphase.c:1001:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           pBuf += sprintf(pBuf, "%c", c);
                                   ^~~~~~~
   drivers/atm/iphase.c:1001:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           pBuf += sprintf(pBuf, "%c", c);
                                   ^~~~~~~
   drivers/atm/iphase.c:1003:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           pBuf += sprintf(pBuf, ".");
                                   ^~~~~~~
   drivers/atm/iphase.c:1003:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           pBuf += sprintf(pBuf, ".");
                                   ^~~~~~~
   drivers/atm/iphase.c:1396:30: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
           *vc_table = vcc->vci << 6;
                                ^
   drivers/atm/iphase.c:2696:6: note: Assuming the condition is false
           if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))  
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2696:2: note: Taking false branch
           if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))  
           ^
   drivers/atm/iphase.c:2701:6: note: Assuming the condition is false
           if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)  
               ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2701:33: note: Left side of '&&' is false
           if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)  
                                          ^
   drivers/atm/iphase.c:2706:6: note: Assuming field 'aal' is equal to ATM_AAL5
           if (vcc->qos.aal != ATM_AAL5)  
               ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2706:2: note: Taking false branch
           if (vcc->qos.aal != ATM_AAL5)  
           ^
   drivers/atm/iphase.c:2708:2: note: Assuming the condition is false
           IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n", 
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
                       ^~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                           ^~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2708:2: note: Taking false branch
           IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n", 
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
                       ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:2713:6: note: Assuming 'ia_vcc' is non-null
           if (!ia_vcc) return -ENOMEM;  
               ^~~~~~~
   drivers/atm/iphase.c:2713:2: note: Taking false branch
           if (!ia_vcc) return -ENOMEM;  
           ^
   drivers/atm/iphase.c:2716:15: note: Calling 'open_rx'
           if ((error = open_rx(vcc)))  
                        ^~~~~~~~~~~~
   drivers/atm/iphase.c:1380:2: note: Assuming the condition is false
           IF_EVENT(printk("iadev: open_rx %d.%d\n", vcc->vpi, vcc->vci);)
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
--
           ^~~~~~
   net/xfrm/xfrm_user.c:3214:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3215:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
           ^~~~~~
   net/xfrm/xfrm_user.c:3215:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
           ^~~~~~
   net/xfrm/xfrm_user.c:3409:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(id, 0, sizeof(*id));
                   ^~~~~~
   net/xfrm/xfrm_user.c:3409:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(id, 0, sizeof(*id));
                   ^~~~~~
   net/xfrm/xfrm_user.c:3414:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&id->sel, &xp->selector, sizeof(id->sel));
                           ^~~~~~
   net/xfrm/xfrm_user.c:3414:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&id->sel, &xp->selector, sizeof(id->sel));
                           ^~~~~~
   net/xfrm/xfrm_user.c:3510:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&ur->sel, sel, sizeof(ur->sel));
           ^~~~~~
   net/xfrm/xfrm_user.c:3510:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&ur->sel, sel, sizeof(ur->sel));
           ^~~~~~
   net/xfrm/xfrm_user.c:3556:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3556:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3560:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3560:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3561:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
           ^~~~~~
   net/xfrm/xfrm_user.c:3561:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
           ^~~~~~
   Suppressed 100 warnings (100 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   sound/core/seq/seq_ports.c:136:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:136:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:155:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:155:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:702:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:702:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   44 warnings generated.
   sound/spi/at73c213.c:714:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->mixername, chip->pcm->name);
           ^~~~~~
   sound/spi/at73c213.c:714:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(card->mixername, chip->pcm->name);
           ^~~~~~
   sound/spi/at73c213.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&chip->reg_image, &snd_at73c213_original_image,
           ^~~~~~
   sound/spi/at73c213.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&chip->reg_image, &snd_at73c213_original_image,
           ^~~~~~
   sound/spi/at73c213.c:962:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
           ^~~~~~~~
   sound/spi/at73c213.c:962:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
           ^~~~~~~~
   sound/spi/at73c213.c:985:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->shortname, board->shortname);
           ^~~~~~
   sound/spi/at73c213.c:985:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(card->shortname, board->shortname);
           ^~~~~~
>> sound/spi/at73c213.c:986:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
           ^~~~~~~
   sound/spi/at73c213.c:986:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
           ^~~~~~~
   Suppressed 39 warnings (39 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   82 warnings generated.
   net/nfc/nci/data.c:240:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(skb_push(skb, reassembly_len),
                   ^~~~~~
   net/nfc/nci/data.c:240:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(skb_push(skb, reassembly_len),
                   ^~~~~~
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   66 warnings generated.
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   101 warnings generated.
   net/nfc/nci/ntf.c:123:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfca_poll->nfcid1, data, nfca_poll->nfcid1_len);
           ^~~~~~
   net/nfc/nci/ntf.c:123:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfca_poll->nfcid1, data, nfca_poll->nfcid1_len);
           ^~~~~~
   net/nfc/nci/ntf.c:147:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfcb_poll->sensb_res, data, nfcb_poll->sensb_res_len);
           ^~~~~~
   net/nfc/nci/ntf.c:147:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfcb_poll->sensb_res, data, nfcb_poll->sensb_res_len);
           ^~~~~~
   net/nfc/nci/ntf.c:164:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfcf_poll->sensf_res, data, nfcf_poll->sensf_res_len);
           ^~~~~~
   net/nfc/nci/ntf.c:164:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfcf_poll->sensf_res, data, nfcf_poll->sensf_res_len);
           ^~~~~~
   net/nfc/nci/ntf.c:177:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfcv_poll->uid, data, NFC_ISO15693_UID_MAXSIZE);
           ^~~~~~
   net/nfc/nci/ntf.c:177:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfcv_poll->uid, data, NFC_ISO15693_UID_MAXSIZE);
           ^~~~~~
   net/nfc/nci/ntf.c:189:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(nfcf_listen->local_nfcid2, data, nfcf_listen->local_nfcid2_len);
           ^~~~~~
   net/nfc/nci/ntf.c:189:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(nfcf_listen->local_nfcid2, data, nfcf_listen->local_nfcid2_len);
           ^~~~~~
   net/nfc/nci/ntf.c:240:20: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
                   target->sens_res = nfca_poll->sens_res;
                                    ^
   net/nfc/nci/ntf.c:756:2: note: Taking false branch
           pr_debug("NCI RX: MT=ntf, PBF=%d, GID=0x%x, OID=0x%x, plen=%d\n",
           ^
   include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
           no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
           if (0)                                          \
           ^
   net/nfc/nci/ntf.c:765:6: note: Assuming the condition is false
           if (nci_opcode_gid(ntf_opcode) == NCI_GID_PROPRIETARY) {
               ^
   include/net/nfc/nci.h:184:29: note: expanded from macro 'nci_opcode_gid'
   #define nci_opcode_gid(op)              (__u8)(((op)&0x0f00)>>8)
                                           ^
   net/nfc/nci/ntf.c:765:2: note: Taking false branch
           if (nci_opcode_gid(ntf_opcode) == NCI_GID_PROPRIETARY) {
           ^
   net/nfc/nci/ntf.c:774:2: note: Control jumps to 'case 259:'  at line 791
           switch (ntf_opcode) {
           ^
   net/nfc/nci/ntf.c:792:3: note: Calling 'nci_rf_discover_ntf_packet'
                   nci_rf_discover_ntf_packet(ndev, skb);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/nfc/nci/ntf.c:338:2: note: Taking false branch
           pr_debug("rf_discovery_id %d\n", ntf.rf_discovery_id);
           ^
   include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
           no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
           if (0)                                          \
           ^
   net/nfc/nci/ntf.c:339:2: note: Taking false branch
           pr_debug("rf_protocol 0x%x\n", ntf.rf_protocol);
           ^
   include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
           no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
           if (0)                                          \
           ^
   net/nfc/nci/ntf.c:340:2: note: Taking false branch
           pr_debug("rf_tech_and_mode 0x%x\n", ntf.rf_tech_and_mode);
           ^
   include/linux/printk.h:576:2: note: expanded from macro 'pr_debug'
           no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
--
                                       ^ ~~~~~~~~~
   net/sched/sch_ets.c:694:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
                   ^~~~~~
   net/sched/sch_ets.c:694:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
                   ^~~~~~
   Suppressed 80 warnings (80 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   106 warnings generated.
   net/ipv4/ipconfig.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ir, 0, sizeof(ir));
           ^~~~~~
   net/ipv4/ipconfig.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ir, 0, sizeof(ir));
           ^~~~~~
   net/ipv4/ipconfig.c:374:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(ir.ifr_ifrn.ifrn_name, ic_dev->dev->name);
           ^~~~~~
   net/ipv4/ipconfig.c:374:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(ir.ifr_ifrn.ifrn_name, ic_dev->dev->name);
           ^~~~~~
   net/ipv4/ipconfig.c:415:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&rm, 0, sizeof(rm));
                   ^~~~~~
   net/ipv4/ipconfig.c:415:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&rm, 0, sizeof(rm));
                   ^~~~~~
   net/ipv4/ipconfig.c:446:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(init_utsname()->nodename, "%pI4", &ic_myaddr);
                   ^~~~~~~
   net/ipv4/ipconfig.c:446:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(init_utsname()->nodename, "%pI4", &ic_myaddr);
                   ^~~~~~~
   net/ipv4/ipconfig.c:1425:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(name, cp, strlen(cp) + 1);
                   ^~~~~~~
   net/ipv4/ipconfig.c:1425:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(name, cp, strlen(cp) + 1);
                   ^~~~~~~
   Suppressed 101 warnings (101 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   126 warnings generated.
   drivers/net/ethernet/sun/niu.c:1704:2: warning: Value stored to 'bmcr' is never read [clang-analyzer-deadcode.DeadStores]
           bmcr = mii_read(np, np->phy_addr, MII_BMCR);
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:1704:2: note: Value stored to 'bmcr' is never read
           bmcr = mii_read(np, np->phy_addr, MII_BMCR);
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2215:3: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
                   niu_link_status_common(np, link_up);
                   ^                          ~~~~~~~
   drivers/net/ethernet/sun/niu.c:2211:11: note: 'link_up' declared without an initial value
           int err, link_up;
                    ^~~~~~~
   drivers/net/ethernet/sun/niu.c:2213:8: note: Calling 'niu_link_status'
           err = niu_link_status(np, &link_up);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2201:6: note: Assuming field 'link_status' is null
           if (ops->link_status)
               ^~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2201:2: note: Taking false branch
           if (ops->link_status)
           ^
   drivers/net/ethernet/sun/niu.c:2204:2: note: Returning without writing to '*link_up_p'
           return err;
           ^
   drivers/net/ethernet/sun/niu.c:2204:2: note: Returning zero (loaded from 'err'), which participates in a condition later
           return err;
           ^~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2213:8: note: Returning from 'niu_link_status'
           err = niu_link_status(np, &link_up);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2214:7: note: 'err' is 0
           if (!err)
                ^~~
   drivers/net/ethernet/sun/niu.c:2214:2: note: Taking true branch
           if (!err)
           ^
   drivers/net/ethernet/sun/niu.c:2215:3: note: 2nd function call argument is an uninitialized value
                   niu_link_status_common(np, link_up);
                   ^                          ~~~~~~~
   drivers/net/ethernet/sun/niu.c:3149:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ent, 0, sizeof(ent));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:3149:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ent, 0, sizeof(ent));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:4636:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
           val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:4636:2: note: Value stored to 'val' is never read
           val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:5003:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:5003:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
>> drivers/net/ethernet/sun/niu.c:6008:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6008:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6011:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6011:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6012:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6012:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6018:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(np->irq_name[i+j], "%s-rx-%d",
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6018:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(np->irq_name[i+j], "%s-rx-%d",
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6021:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6021:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6032:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
           err = 0;
           ^     ~
   drivers/net/ethernet/sun/niu.c:6032:2: note: Value stored to 'err' is never read
           err = 0;
           ^     ~
   drivers/net/ethernet/sun/niu.c:6557:9: warning: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl' [clang-analyzer-deadcode.DeadStores]
           ipv6 = ihl = 0;
                  ^     ~
   drivers/net/ethernet/sun/niu.c:6557:9: note: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl'
           ipv6 = ihl = 0;
                  ^     ~
   drivers/net/ethernet/sun/niu.c:6785:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
           ^~~~~~~~
   drivers/net/ethernet/sun/niu.c:6785:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
           ^~~~~~~~
   drivers/net/ethernet/sun/niu.c:6800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(cmd, 0, sizeof(*cmd));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:6800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(cmd, 0, sizeof(*cmd));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:6882:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, ((char *)&val) + b_offset, b_count);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6882:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, ((char *)&val) + b_offset, b_count);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6889:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, &val, 4);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6889:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, &val, 4);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6896:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, &val, len);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6896:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, &val, len);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7501:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:7501:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:7739:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_xmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7739:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_xmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7743:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_bmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7743:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_bmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7748:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_rxchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7748:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_rxchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7753:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_txchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7753:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_txchan_stat_keys,
--
           ^~~~~~
   net/bridge/br_multicast_eht.c:516:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&eht_src_addr, 0, sizeof(eht_src_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:518:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:518:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:538:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&eht_src_addr, 0, sizeof(eht_src_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:538:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&eht_src_addr, 0, sizeof(eht_src_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&src_ip, 0, sizeof(src_ip));
           ^~~~~~
   net/bridge/br_multicast_eht.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&src_ip, 0, sizeof(src_ip));
           ^~~~~~
   net/bridge/br_multicast_eht.c:542:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:542:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&eht_src_addr, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:545:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&src_ip, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:545:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&src_ip, srcs + (src_idx * addr_size), addr_size);
                   ^~~~~~
   net/bridge/br_multicast_eht.c:618:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&eht_src_addr, 0, sizeof(eht_src_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:618:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&eht_src_addr, 0, sizeof(eht_src_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&eht_host_addr, 0, sizeof(eht_host_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&eht_host_addr, 0, sizeof(eht_host_addr));
           ^~~~~~
   net/bridge/br_multicast_eht.c:792:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&eht_host_addr, h_addr, addr_size);
           ^~~~~~
   net/bridge/br_multicast_eht.c:792:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&eht_host_addr, h_addr, addr_size);
           ^~~~~~
   Suppressed 102 warnings (102 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: note: Value stored to 'val' is never read
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   95 warnings generated.
   drivers/net/ethernet/freescale/gianfar.c:1684:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1684:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
>> drivers/net/ethernet/freescale/gianfar.c:3325:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3325:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   Suppressed 86 warnings (86 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   93 warnings generated.
   net/ipv6/ip6_flowlabel.c:401:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(fl->opt, 0, sizeof(*fl->opt));
                   ^~~~~~
   net/ipv6/ip6_flowlabel.c:401:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(fl->opt, 0, sizeof(*fl->opt));
                   ^~~~~~
   net/ipv6/ip6_flowlabel.c:410:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&flowi6, 0, sizeof(flowi6));
                   ^~~~~~
   net/ipv6/ip6_flowlabel.c:410:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&flowi6, 0, sizeof(flowi6));
                   ^~~~~~
   Suppressed 91 warnings (91 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   108 warnings generated.
   net/ipv6/inet6_connection_sock.c:37:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fl6, 0, sizeof(*fl6));
           ^~~~~~
   net/ipv6/inet6_connection_sock.c:37:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(fl6, 0, sizeof(*fl6));
           ^~~~~~
   net/ipv6/inet6_connection_sock.c:87:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fl6, 0, sizeof(*fl6));
           ^~~~~~
   net/ipv6/inet6_connection_sock.c:87:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(fl6, 0, sizeof(*fl6));
           ^~~~~~
   Suppressed 106 warnings (106 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   19 warnings generated.
   Suppressed 19 warnings (19 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   43 warnings generated.
   include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
           __list_del(entry->prev, entry->next);
                      ^
   sound/core/control.c:121:2: note: Loop condition is false.  Exiting loop
           write_lock_irqsave(&card->ctl_files_rwlock, flags);
           ^
   include/linux/rwlock.h:72:2: note: expanded from macro 'write_lock_irqsave'
           do {                                            \
           ^
   sound/core/control.c:123:2: note: Loop condition is false.  Exiting loop
           write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
           ^
   include/linux/rwlock.h:109:2: note: expanded from macro 'write_unlock_irqrestore'
           do {                                            \
           ^
   sound/core/control.c:125:2: note: Loop condition is false. Execution continues on line 129
           list_for_each_entry(control, &card->controls, list)
           ^
   include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
           for (pos = list_first_entry(head, typeof(*pos), member);        \
           ^
   sound/core/control.c:130:2: note: Calling 'snd_ctl_empty_read_queue'
           snd_ctl_empty_read_queue(ctl);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   sound/core/control.c:101:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&ctl->read_lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   sound/core/control.c:101:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&ctl->read_lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   sound/core/control.c:102:2: note: Loop condition is true.  Entering loop body
           while (!list_empty(&ctl->events)) {
--
   88 warnings generated.
   Suppressed 88 warnings (88 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   129 warnings generated.
   drivers/net/ethernet/intel/igc/igc_main.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ring->rx_buffer_info, 0,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ring->rx_buffer_info, 0,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:878:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:878:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:914:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:914:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:929:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:929:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:954:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:954:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:992:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:992:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:1776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:1776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2899:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2899:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2928:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2928:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2964:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2964:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:3238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&flex->data[offset], src, len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:3238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&flex->data[offset], src, len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4011:3: warning: Value stored to 'current_itr' is never read [clang-analyzer-deadcode.DeadStores]
                   current_itr = 0;
                   ^             ~
   drivers/net/ethernet/intel/igc/igc_main.c:4011:3: note: Value stored to 'current_itr' is never read
                   current_itr = 0;
                   ^             ~
   drivers/net/ethernet/intel/igc/igc_main.c:4168:6: warning: Value stored to 'new_val' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           int new_val = q_vector->itr_val;
               ^~~~~~~   ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4168:6: note: Value stored to 'new_val' during its initialization is never read
           int new_val = q_vector->itr_val;
               ^~~~~~~   ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4350:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4350:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4928:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(stats, &adapter->stats64, sizeof(*stats));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4928:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(stats, &adapter->stats64, sizeof(*stats));
           ^~~~~~
>> drivers/net/ethernet/intel/igc/igc_main.c:5173:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5173:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5176:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-tx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5176:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-tx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5179:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-rx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5179:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-rx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5182:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-unused", netdev->name);
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5182:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-unused", netdev->name);
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6332:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6332:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(netdev->name, "eth%d", IFNAMSIZ);
           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(netdev->name, "eth%d", IFNAMSIZ);
           ^~~~~~~
   Suppressed 106 warnings (106 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   85 warnings generated.
   Suppressed 85 warnings (85 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   80 warnings generated.
   net/batman-adv/routing.c:662:17: warning: Value stored to 'ethhdr' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct ethhdr *ethhdr = eth_hdr(skb);
                          ^~~~~~   ~~~~~~~~~~~~
   net/batman-adv/routing.c:662:17: note: Value stored to 'ethhdr' during its initialization is never read
           struct ethhdr *ethhdr = eth_hdr(skb);
                          ^~~~~~   ~~~~~~~~~~~~
   Suppressed 79 warnings (79 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   Suppressed 79 warnings (79 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   81 warnings generated.
   net/batman-adv/soft-interface.c:209:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(skb->cb, 0, sizeof(struct batadv_skb_cb));
           ^~~~~~
   net/batman-adv/soft-interface.c:209:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(skb->cb, 0, sizeof(struct batadv_skb_cb));
           ^~~~~~
   net/batman-adv/soft-interface.c:950:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, batadv_counters_strings,
                   ^~~~~~
   net/batman-adv/soft-interface.c:950:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, batadv_counters_strings,
                   ^~~~~~
   Suppressed 79 warnings (79 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   84 warnings generated.
   net/batman-adv/tp_meter.c:553:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&buf[pos], &batadv_tp_prerandom[local_offset], to_copy);
                   ^~~~~~
   net/batman-adv/tp_meter.c:553:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&buf[pos], &batadv_tp_prerandom[local_offset], to_copy);
                   ^~~~~~
   net/batman-adv/tp_meter.c:605:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(icmp->session, session, sizeof(icmp->session));
           ^~~~~~
   net/batman-adv/tp_meter.c:605:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(icmp->session, session, sizeof(icmp->session));
           ^~~~~~
   net/batman-adv/tp_meter.c:986:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tp_vars->session, session_id, sizeof(session_id));
           ^~~~~~
   net/batman-adv/tp_meter.c:986:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(tp_vars->session, session_id, sizeof(session_id));
           ^~~~~~
   net/batman-adv/tp_meter.c:1193:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(icmp->session, session, sizeof(icmp->session));
           ^~~~~~
   net/batman-adv/tp_meter.c:1193:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(icmp->session, session, sizeof(icmp->session));
           ^~~~~~
   net/batman-adv/tp_meter.c:1352:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tp_vars->session, icmp->session, sizeof(tp_vars->session));
--
   drivers/md/dm-writecache.c:2004:5: note:  Execution continues on line 1970
                                   continue;
                                   ^
   drivers/md/dm-writecache.c:1970:9: note: Assuming the condition is true
           while (!list_empty(&wc->lru) &&
                  ^~~~~~~~~~~~~~~~~~~~~
   drivers/md/dm-writecache.c:1970:9: note: Left side of '&&' is true
   drivers/md/dm-writecache.c:1971:10: note: Assuming field 'writeback_all' is not equal to 0
                  (wc->writeback_all ||
                   ^~~~~~~~~~~~~~~~~
   drivers/md/dm-writecache.c:1971:28: note: Left side of '||' is true
                  (wc->writeback_all ||
                                     ^
   drivers/md/dm-writecache.c:1977:46: note: Left side of '&&' is false
                   if (unlikely(n_walked > WRITEBACK_LATENCY) &&
                                                              ^
   drivers/md/dm-writecache.c:1984:20: note: Field 'writeback_all' is not equal to 0
                   if (unlikely(wc->writeback_all)) {
                                    ^
   drivers/md/dm-writecache.c:1984:3: note: Taking true branch
                   if (unlikely(wc->writeback_all)) {
                   ^
   drivers/md/dm-writecache.c:1985:18: note: 'e' is non-null
                           if (unlikely(!e)) {
                                         ^
   include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
   # define unlikely(x)    __builtin_expect(!!(x), 0)
                                               ^
   drivers/md/dm-writecache.c:1985:4: note: Taking false branch
                           if (unlikely(!e)) {
                           ^
   drivers/md/dm-writecache.c:1989:7: note: Assigned value is garbage or undefined
                                   e = g;
                                     ^ ~
   drivers/md/dm-writecache.c:2351:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if (sscanf(string, "%u%c", &wc->block_size, &dummy) != 1 ||
               ^~~~~~
   drivers/md/dm-writecache.c:2351:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
           if (sscanf(string, "%u%c", &wc->block_size, &dummy) != 1 ||
               ^~~~~~
   drivers/md/dm-writecache.c:2382:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%llu%c", &start_sector, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2382:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%llu%c", &start_sector, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2391:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%d%c", &high_wm_percent, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2391:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%d%c", &high_wm_percent, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2399:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%d%c", &low_wm_percent, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2399:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%d%c", &low_wm_percent, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2407:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%u%c", &wc->max_writeback_jobs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2407:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%u%c", &wc->max_writeback_jobs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2412:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%u%c", &wc->autocommit_blocks, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2412:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%u%c", &wc->autocommit_blocks, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2418:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%u%c", &autocommit_msecs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2418:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%u%c", &autocommit_msecs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2428:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%u%c", &max_age_msecs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2428:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%u%c", &max_age_msecs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2455:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(string, "%u%c", &pause_msecs, &dummy) != 1)
                               ^~~~~~
   drivers/md/dm-writecache.c:2455:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(string, "%u%c", &pause_msecs, &dummy) != 1)
                               ^~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
                   ^~~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
                   ^~~~~~~~
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   77 warnings generated.
>> drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   113 warnings generated.
   drivers/net/ethernet/broadcom/bcmsysport.c:381:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:381:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:387:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(buf, sizeof(buf), "txq%d_packets", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:387:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(buf, sizeof(buf), "txq%d_packets", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:388:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:388:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:392:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(buf, sizeof(buf), "txq%d_bytes", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:392:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(buf, sizeof(buf), "txq%d_bytes", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:393:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:393:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:543:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:543:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:560:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
                   ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:560:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
                   ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:903:21: warning: Value stored to 'ndev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *ndev = priv->netdev;
                              ^~~~   ~~~~~~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:903:21: note: Value stored to 'ndev' during its initialization is never read
           struct net_device *ndev = priv->netdev;
                              ^~~~   ~~~~~~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tsb, 0, sizeof(*tsb));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tsb, 0, sizeof(*tsb));
           ^~~~~~
   Suppressed 104 warnings (100 in non-user code, 4 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   80 warnings generated.
   Suppressed 80 warnings (80 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   102 warnings generated.
   net/sched/em_meta.c:933:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&meta->lvalue.hdr, &hdr->left, sizeof(hdr->left));
           ^~~~~~
   net/sched/em_meta.c:933:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&meta->lvalue.hdr, &hdr->left, sizeof(hdr->left));
           ^~~~~~
   net/sched/em_meta.c:934:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&meta->rvalue.hdr, &hdr->right, sizeof(hdr->right));
           ^~~~~~
   net/sched/em_meta.c:934:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&meta->rvalue.hdr, &hdr->right, sizeof(hdr->right));
           ^~~~~~
   net/sched/em_meta.c:968:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   net/sched/em_meta.c:968:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   net/sched/em_meta.c:969:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hdr.left, &meta->lvalue.hdr, sizeof(hdr.left));
           ^~~~~~
   net/sched/em_meta.c:969:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hdr.left, &meta->lvalue.hdr, sizeof(hdr.left));
           ^~~~~~
   net/sched/em_meta.c:970:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hdr.right, &meta->rvalue.hdr, sizeof(hdr.right));
           ^~~~~~
   net/sched/em_meta.c:970:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hdr.right, &meta->rvalue.hdr, sizeof(hdr.right));
           ^~~~~~
   Suppressed 97 warnings (97 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
                   ^~~~~~
   net/ipv6/route.c:5434:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&r_cfg, cfg, sizeof(*cfg));
                   ^~~~~~
   net/ipv6/route.c:5937:11: warning: Although the value stored to 'count' is used in the enclosing expression, the value is never actually read from 'count' [clang-analyzer-deadcode.DeadStores]
                           return count += w.count;
                                  ^        ~~~~~~~
   net/ipv6/route.c:5937:11: note: Although the value stored to 'count' is used in the enclosing expression, the value is never actually read from 'count'
                           return count += w.count;
                                  ^        ~~~~~~~
   net/ipv6/route.c:6458:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&net->ipv6.ip6_dst_ops, &ip6_dst_ops_template,
           ^~~~~~
   net/ipv6/route.c:6458:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&net->ipv6.ip6_dst_ops, &ip6_dst_ops_template,
           ^~~~~~
   net/ipv6/route.c:6467:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(net->ipv6.fib6_null_entry, &fib6_null_entry_template,
           ^~~~~~
   net/ipv6/route.c:6467:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(net->ipv6.fib6_null_entry, &fib6_null_entry_template,
           ^~~~~~
   Suppressed 126 warnings (126 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   drivers/net/arcnet/rfc1201.c:195:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(pkt, pkthdr, sizeof(struct archdr));
                   ^~~~~~
   drivers/net/arcnet/rfc1201.c:195:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(pkt, pkthdr, sizeof(struct archdr));
                   ^~~~~~
   drivers/net/arcnet/rfc1201.c:303:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(pkt, pkthdr, ARC_HDR_SIZE + RFC1201_HDR_SIZE);
                           ^~~~~~
   drivers/net/arcnet/rfc1201.c:303:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(pkt, pkthdr, ARC_HDR_SIZE + RFC1201_HDR_SIZE);
                           ^~~~~~
   drivers/net/arcnet/rfc1201.c:348:4: warning: Value stored to 'soft' is never read [clang-analyzer-deadcode.DeadStores]
                           soft = &pkt->soft.rfc1201;
                           ^      ~~~~~~~~~~~~~~~~~~
   drivers/net/arcnet/rfc1201.c:348:4: note: Value stored to 'soft' is never read
                           soft = &pkt->soft.rfc1201;
                           ^      ~~~~~~~~~~~~~~~~~~
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   drivers/net/arcnet/rfc1051.c:147:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(pkt, pkthdr, sizeof(struct archdr));
           ^~~~~~
   drivers/net/arcnet/rfc1051.c:147:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(pkt, pkthdr, sizeof(struct archdr));
           ^~~~~~
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   87 warnings generated.
   net/batman-adv/distributed-arp-table.c:1611:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(buf, chaddr, BATADV_DHCP_CHADDR_LEN);
                   ^~~~~~
   net/batman-adv/distributed-arp-table.c:1611:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(buf, chaddr, BATADV_DHCP_CHADDR_LEN);
                   ^~~~~~
   Suppressed 86 warnings (86 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   82 warnings generated.
   net/batman-adv/fragmentation.c:280:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
           ^~~~~~~
   net/batman-adv/fragmentation.c:280:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
           memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
           ^~~~~~~
   net/batman-adv/fragmentation.c:425:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb_fragment->data, frag_head, header_size);
           ^~~~~~
   net/batman-adv/fragmentation.c:425:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb_fragment->data, frag_head, header_size);
           ^~~~~~
   net/batman-adv/fragmentation.c:535:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb->data, &frag_header, header_size);
           ^~~~~~
   net/batman-adv/fragmentation.c:535:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb->data, &frag_header, header_size);
           ^~~~~~
   Suppressed 79 warnings (79 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   96 warnings generated.
   drivers/net/ethernet/mellanox/mlx4/main.c:562:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&hca_param, 0, sizeof(hca_param));
                   ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:562:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&hca_param, 0, sizeof(hca_param));
                   ^~~~~~
>> drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(type, "%s",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(type, "%s",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "auto (%s)\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "auto (%s)\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "%s\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "%s\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(buf, "%d\n",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(buf, "%d\n",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->dev_name, "mlx4_port%d", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->dev_name, "mlx4_port%d", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
                           err = -ENOMEM;
                           ^     ~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: note: Value stored to 'err' is never read
                           err = -ENOMEM;
                           ^     ~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(dev_cap, 0, sizeof(*dev_cap));
                           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(dev_cap, 0, sizeof(*dev_cap));
                           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3517:30: warning: Access to field 'flags2' results in a dereference of a null pointer (loaded from variable 'dev_cap') [clang-analyzer-core.NullDereference]
           if (mlx4_is_master(dev) && (dev_cap->flags2 & MLX4_DEV_CAP_FLAG2_SYS_EQS)) {
                                       ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3341:2: note: 'dev_cap' initialized to a null pointer value
           struct mlx4_dev_cap *dev_cap = NULL;
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3347:2: note: Loop condition is false.  Exiting loop
           spin_lock_init(&priv->ctx_lock);
           ^
   include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
   # define spin_lock_init(lock)                                   \
                                                                   ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3349:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->port_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3350:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->bond_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3353:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->pgdir_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3354:2: note: Loop condition is false.  Exiting loop
           spin_lock_init(&priv->cmd.context_lock);
           ^
   include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
   # define spin_lock_init(lock)                                   \
                                                                   ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3357:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->bf_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3363:6: note: Assuming the condition is true
           if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3363:2: note: Taking true branch
           if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
--
           ^
   drivers/net/ethernet/mellanox/mlx4/mlx4.h:219:2: note: expanded from macro 'mlx4_dbg'
           if (mlx4_debug_level)                                           \
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2787:2: note: Loop condition is false.  Exiting loop
           mlx4_dbg(dev, "NOP command IRQ test passed\n");
           ^
   drivers/net/ethernet/mellanox/mlx4/mlx4.h:217:41: note: expanded from macro 'mlx4_dbg'
   #define mlx4_dbg(mdev, format, ...)                                     \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2790:6: note: Assuming 'err' is 0
           if (err) {
               ^~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2790:2: note: Taking false branch
           if (err) {
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2796:6: note: Assuming 'err' is 0
           if (err) {
               ^~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2796:2: note: Taking false branch
           if (err) {
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2802:6: note: Assuming 'err' is 0
           if (err) {
               ^~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2802:2: note: Taking false branch
           if (err) {
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2807:6: note: Assuming the condition is true
           if (!mlx4_is_slave(dev)) {
               ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2807:2: note: Taking true branch
           if (!mlx4_is_slave(dev)) {
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2808:9: note: Calling 'mlx4_init_counters_table'
                   err = mlx4_init_counters_table(dev);
                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2509:6: note: Assuming the condition is false
           if (!(dev->caps.flags & MLX4_DEV_CAP_FLAG_COUNTERS))
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2509:2: note: Taking false branch
           if (!(dev->caps.flags & MLX4_DEV_CAP_FLAG_COUNTERS))
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2512:6: note: Assuming field 'max_counters' is not equal to 0
           if (!dev->caps.max_counters)
               ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2512:2: note: Taking false branch
           if (!dev->caps.max_counters)
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2515:14: note: '?' condition is false
           nent_pow2 = roundup_pow_of_two(dev->caps.max_counters);
                       ^
   include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
           __builtin_constant_p(n) ? (             \
           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:2515:14: note: Calling '__roundup_pow_of_two'
           nent_pow2 = roundup_pow_of_two(dev->caps.max_counters);
                       ^
   include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
           __roundup_pow_of_two(n)                 \
           ^~~~~~~~~~~~~~~~~~~~~~~
   include/linux/log2.h:57:16: note: Calling 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/bitops.h:154:2: note: Taking false branch
           if (sizeof(l) == 4)
           ^
   include/linux/bitops.h:156:9: note: Calling 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/asm-generic/bitops/fls64.h:29:6: note: Assuming 'x' is not equal to 0
           if (x == 0)
               ^~~~~~
   include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
           if (x == 0)
           ^
   include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
           return __fls(x) + 1;
           ^~~~~~~~~~~~~~~~~~~
   include/linux/bitops.h:156:9: note: Returning from 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/linux/bitops.h:156:2: note: Returning the value 64
           return fls64(l);
           ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:16: note: Returning from 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
           return 1UL << fls_long(n - 1);
                      ^  ~~~~~~~~~~~~~~~
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   97 warnings generated.
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ts, 0, sizeof(ts));
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ts, 0, sizeof(ts));
           ^~~~~~
>> drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-rxtx-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-rxtx-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-sq-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-sq-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-rbdr-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-rbdr-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
                           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
                           ^~~~~~
   include/linux/log2.h:67:13: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << (fls_long(n) - 1);
                      ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1898:2: note: Taking false branch
           if (pass1_silicon(nic->pdev))
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1901:2: note: Control jumps to 'case XDP_SETUP_PROG:'  at line 1902
           switch (xdp->command) {
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1903:10: note: Calling 'nicvf_xdp_setup'
                   return nicvf_xdp_setup(nic, xdp->prog);
                          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:6: note: Assuming 'prog' is null
           if (prog && dev->mtu > MAX_XDP_MTU) {
               ^~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:11: note: Left side of '&&' is false
           if (prog && dev->mtu > MAX_XDP_MTU) {
                    ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:6: note: Assuming the condition is false
           if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:2: note: Taking false branch
           if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:6: note: Assuming 'if_up' is true
           if (if_up)
               ^~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:2: note: Taking true branch
           if (if_up)
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Loop condition is false.  Exiting loop
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1884:2: note: expanded from macro 'xchg'
           kcsan_mb(); \
           ^
   include/linux/kcsan-checks.h:264:20: note: expanded from macro 'kcsan_mb'
   #define kcsan_mb()      do { } while (0)
                           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Control jumps to 'case 8:'  at line 1867
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
           arch_xchg(__ai_ptr, __VA_ARGS__); \
           ^
   arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
           (__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr)));        \
                                ^
   arch/riscv/include/asm/cmpxchg.h:122:2: note: expanded from macro '__xchg'
           switch (size) {                                                 \
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note:  Execution continues on line 1867
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
           arch_xchg(__ai_ptr, __VA_ARGS__); \
           ^
   arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
           (__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr)));        \
                                ^
   arch/riscv/include/asm/cmpxchg.h:136:3: note: expanded from macro '__xchg'
                   break;                                                  \
                   ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1869:6: note: Assuming 'old_prog' is null
           if (old_prog)
--
                                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
           int r = 32;
           ^~~~~
   include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0
           if (!x)
               ^~
   include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
           if (!x)
           ^
   include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
           if (!(x & 0xffff0000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
           if (!(x & 0xffff0000u)) {
           ^
   include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
           if (!(x & 0xff000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
           if (!(x & 0xff000000u)) {
           ^
   include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
           if (!(x & 0xf0000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
           if (!(x & 0xf0000000u)) {
           ^
   include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
           if (!(x & 0xc0000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
           if (!(x & 0xc0000000u)) {
           ^
   include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
           if (!(x & 0x80000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
           if (!(x & 0x80000000u)) {
           ^
   include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
           return r;
           ^~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Returning from 'fls'
                                       fls(dev->caps.reserved_mtts - 1));
                                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Passing the value 32 via 3rd parameter 'order'
                                       fls(dev->caps.reserved_mtts - 1));
                                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:963:3: note: Calling 'mlx4_free_mtt_range'
                   mlx4_free_mtt_range(dev, priv->reserved_mtts,
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:236:6: note: Assuming the condition is false
           if (mlx4_is_mfunc(dev)) {
               ^~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:236:2: note: Taking false branch
           if (mlx4_is_mfunc(dev)) {
           ^
   drivers/net/ethernet/mellanox/mlx4/mr.c:248:37: note: Passing the value 32 via 3rd parameter 'order'
           __mlx4_free_mtt_range(dev, offset, order);
                                              ^~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:248:2: note: Calling '__mlx4_free_mtt_range'
           __mlx4_free_mtt_range(dev, offset, order);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: Assuming '__UNIQUE_ID___x352' is <= '__UNIQUE_ID___y353'
           seg_order = max_t(int, order - log_mtts_per_seg, 0);
                       ^
   include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
   #define max_t(type, x, y)       __careful_cmp((type)(x), (type)(y), >)
                                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
   #define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
                            ^~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: '?' condition is false
           seg_order = max_t(int, order - log_mtts_per_seg, 0);
                       ^
   include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
   #define max_t(type, x, y)       __careful_cmp((type)(x), (type)(y), >)
                                   ^
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
                   ^
   include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
   #define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
                            ^
   drivers/net/ethernet/mellanox/mlx4/mr.c:228:21: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
                                offset + (1 << order) - 1);
                                            ^  ~~~~~
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   87 warnings generated.
>> drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(*data, "rxq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(*data, "rxq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(*data, "txq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(*data, "txq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(data, "bgx_rxstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(data, "bgx_rxstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(data, "bgx_txstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(data, "bgx_txstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, NIC_VF_REG_COUNT);
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, NIC_VF_REG_COUNT);
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(channel, 0, sizeof(*channel));
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(channel, 0, sizeof(*channel));
           ^~~~~~
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   115 warnings generated.
   net/ipv4/ip_vti.c:286:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&fl, 0, sizeof(fl));
           ^~~~~~
   net/ipv4/ip_vti.c:286:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&fl, 0, sizeof(fl));
           ^~~~~~
   net/ipv4/ip_vti.c:291:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
                   ^~~~~~
   net/ipv4/ip_vti.c:291:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
                   ^~~~~~
   net/ipv4/ip_vti.c:295:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
                   ^~~~~~
   net/ipv4/ip_vti.c:295:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
                   ^~~~~~
   net/ipv4/ip_vti.c:429:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dev->broadcast, &iph->daddr, 4);
           ^~~~~~
   net/ipv4/ip_vti.c:429:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dev->broadcast, &iph->daddr, 4);
           ^~~~~~
   net/ipv4/ip_vti.c:535:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(parms, 0, sizeof(*parms));
           ^~~~~~
   net/ipv4/ip_vti.c:535:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(parms, 0, sizeof(*parms));
           ^~~~~~
   Suppressed 110 warnings (110 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   109 warnings generated.
   drivers/net/ethernet/mellanox/mlx4/pd.c:154:23: warning: Division by zero [clang-analyzer-core.DivideZero]
                   offset = uar->index % ((int)pci_resource_len(dev->persist->pdev,
                                       ^
   drivers/net/ethernet/mellanox/mlx4/pd.c:179:6: note: Assuming field 'bf_mapping' is non-null
           if (!priv->bf_mapping)
--
           ^~~~~~~~
   Suppressed 51 warnings (51 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   55 warnings generated.
   drivers/gpu/drm/drm_debugfs.c:214:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(name, "%d", minor_id);
           ^~~~~~~
   drivers/gpu/drm/drm_debugfs.c:214:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(name, "%d", minor_id);
           ^~~~~~~
   drivers/gpu/drm/drm_debugfs.c:246:22: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
                   list_for_each_safe(pos, q, &minor->debugfs_list) {
                                      ^
   include/linux/list.h:607:31: note: expanded from macro 'list_for_each_safe'
           for (pos = (head)->next, n = pos->next; \
                                        ^~~~~~~~~
   drivers/gpu/drm/drm_debugfs.c:245:14: note: Assuming 'i' is < 'count'
           for (i = 0; i < count; i++) {
                       ^~~~~~~~~
   drivers/gpu/drm/drm_debugfs.c:245:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < count; i++) {
           ^
   drivers/gpu/drm/drm_debugfs.c:246:3: note: Loop condition is true.  Entering loop body
                   list_for_each_safe(pos, q, &minor->debugfs_list) {
                   ^
   include/linux/list.h:607:2: note: expanded from macro 'list_for_each_safe'
           for (pos = (head)->next, n = pos->next; \
           ^
   drivers/gpu/drm/drm_debugfs.c:248:8: note: Assuming the condition is true
                           if (tmp->info_ent == &files[i]) {
                               ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/gpu/drm/drm_debugfs.c:248:4: note: Taking true branch
                           if (tmp->info_ent == &files[i]) {
                           ^
   drivers/gpu/drm/drm_debugfs.c:251:5: note: Memory is released
                                   kfree(tmp);
                                   ^~~~~~~~~~
   drivers/gpu/drm/drm_debugfs.c:246:3: note: Loop condition is false. Execution continues on line 245
                   list_for_each_safe(pos, q, &minor->debugfs_list) {
                   ^
   include/linux/list.h:607:2: note: expanded from macro 'list_for_each_safe'
           for (pos = (head)->next, n = pos->next; \
           ^
   drivers/gpu/drm/drm_debugfs.c:245:14: note: Assuming 'i' is < 'count'
           for (i = 0; i < count; i++) {
                       ^~~~~~~~~
   drivers/gpu/drm/drm_debugfs.c:245:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < count; i++) {
           ^
   drivers/gpu/drm/drm_debugfs.c:246:22: note: Use of memory after it is freed
                   list_for_each_safe(pos, q, &minor->debugfs_list) {
                                      ^
   include/linux/list.h:607:31: note: expanded from macro 'list_for_each_safe'
           for (pos = (head)->next, n = pos->next; \
                                        ^~~~~~~~~
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   55 warnings generated.
   drivers/gpu/drm/drm_debugfs_crc.c:330:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "0x%08x", entry->frame);
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:330:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "0x%08x", entry->frame);
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:332:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "XXXXXXXXXX");
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:332:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "XXXXXXXXXX");
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:335:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf + 10 + i * 11, " 0x%08x", entry->crcs[i]);
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:335:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf + 10 + i * 11, " 0x%08x", entry->crcs[i]);
                   ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:336:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(buf + 10 + crc->values_cnt * 11, "\n");
           ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:336:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(buf + 10 + crc->values_cnt * 11, "\n");
           ^~~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&entry->crcs, crcs, sizeof(*crcs) * crc->values_cnt);
           ^~~~~~
   drivers/gpu/drm/drm_debugfs_crc.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&entry->crcs, crcs, sizeof(*crcs) * crc->values_cnt);
           ^~~~~~
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   60 warnings generated.
>> drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
                          ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
                          ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s,type=0x%x\n",
                  ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:71:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s,type=0x%x\n",
                  ^~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
           ^~~~~~~~
   drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:546:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(pmu_name, PMU_NAME_SIZE, "%s_%d", pmu_entry->pmu_file_prefix,
           ^~~~~~~~
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   58 warnings generated.
   fs/reiserfs/super.c:251:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&last_inode_key, 0, sizeof(last_inode_key));
           ^~~~~~
   fs/reiserfs/super.c:251:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&last_inode_key, 0, sizeof(last_inode_key));
           ^~~~~~
   fs/reiserfs/super.c:360:4: warning: Value stored to 'truncate' is never read [clang-analyzer-deadcode.DeadStores]
                           truncate = 0;
                           ^          ~
   fs/reiserfs/super.c:360:4: note: Value stored to 'truncate' is never read
                           truncate = 0;
                           ^          ~
   fs/reiserfs/super.c:648:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ei->i_dquot, 0, sizeof(ei->i_dquot));
           ^~~~~~
   fs/reiserfs/super.c:648:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ei->i_dquot, 0, sizeof(ei->i_dquot));
           ^~~~~~
   fs/reiserfs/super.c:1449:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(qf_names, REISERFS_SB(s)->s_qf_names, sizeof(qf_names));
           ^~~~~~
   fs/reiserfs/super.c:1449:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(qf_names, REISERFS_SB(s)->s_qf_names, sizeof(qf_names));
           ^~~~~~
   fs/reiserfs/super.c:2149:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           memcpy(rs->s_v1.s_magic,
                                           ^~~~~~
   fs/reiserfs/super.c:2149:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                           memcpy(rs->s_v1.s_magic,
                                           ^~~~~~
   fs/reiserfs/super.c:2519:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(data, 0, tocopy);
                           ^~~~~~
   fs/reiserfs/super.c:2519:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(data, 0, tocopy);
                           ^~~~~~
   fs/reiserfs/super.c:2524:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data, bh->b_data + offset, tocopy);
                           ^~~~~~
   fs/reiserfs/super.c:2524:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data, bh->b_data + offset, tocopy);
                           ^~~~~~
   fs/reiserfs/super.c:2572:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(bh->b_data + offset, data, tocopy);
                   ^~~~~~
   fs/reiserfs/super.c:2572:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(bh->b_data + offset, data, tocopy);
                   ^~~~~~
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   crypto/algboss.c:96:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(param->template, name, len);
           ^~~~~~
   crypto/algboss.c:96:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(param->template, name, len);
           ^~~~~~
   crypto/algboss.c:126:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(param->attrs[i].data.name, name, len);
                   ^~~~~~
   crypto/algboss.c:126:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(param->attrs[i].data.name, name, len);
                   ^~~~~~
   crypto/algboss.c:209:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
           ^~~~~~
   crypto/algboss.c:209:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
           ^~~~~~
   crypto/algboss.c:210:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(param->alg, alg->cra_name, sizeof(param->alg));
           ^~~~~~
   crypto/algboss.c:210:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(param->alg, alg->cra_name, sizeof(param->alg));
--
           ^~~~~~
   fs/reiserfs/ibalance.c:457:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memmove(key + 1, key,
           ^~~~~~~
   fs/reiserfs/ibalance.c:457:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
           memmove(key + 1, key,
           ^~~~~~~
   fs/reiserfs/ibalance.c:461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(key, internal_key(src, src_position), KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(key, internal_key(src, src_position), KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:769:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(internal_key(tb->CFL[h], tb->lkey[h]), key, KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:769:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(internal_key(tb->CFL[h], tb->lkey[h]), key, KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:784:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(internal_key(tb->CFR[h], tb->rkey[h]), key, KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:784:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(internal_key(tb->CFR[h], tb->rkey[h]), key, KEY_SIZE);
           ^~~~~~
   fs/reiserfs/ibalance.c:853:2: warning: Value stored to 'k' is never read [clang-analyzer-deadcode.DeadStores]
           k = 0;
           ^   ~
   fs/reiserfs/ibalance.c:853:2: note: Value stored to 'k' is never read
           k = 0;
           ^   ~
   fs/reiserfs/ibalance.c:1065:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&new_insert_key, internal_key(tbSh, n - snum),
                           ^~~~~~
   fs/reiserfs/ibalance.c:1065:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&new_insert_key, internal_key(tbSh, n - snum),
                           ^~~~~~
   fs/reiserfs/ibalance.c:1077:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&new_insert_key,
                           ^~~~~~
   fs/reiserfs/ibalance.c:1077:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&new_insert_key,
                           ^~~~~~
   fs/reiserfs/ibalance.c:1112:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&new_insert_key, insert_key + insert_num - k - 1,
                           ^~~~~~
   fs/reiserfs/ibalance.c:1112:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&new_insert_key, insert_key + insert_num - k - 1,
                           ^~~~~~
   fs/reiserfs/ibalance.c:1158:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(new_insert_key_addr, &new_insert_key, KEY_SIZE);
                   ^~~~~~
   fs/reiserfs/ibalance.c:1158:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(new_insert_key_addr, &new_insert_key, KEY_SIZE);
                   ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   drivers/misc/cb710/sgbuf2.c:33:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(addr, miter->addr + miter->consumed, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:33:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(addr, miter->addr + miter->consumed, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(addr, 0, left);
           ^~~~~~
   drivers/misc/cb710/sgbuf2.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(addr, 0, left);
           ^~~~~~
   drivers/misc/cb710/sgbuf2.c:108:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(miter->addr, addr, len);
                   ^~~~~~
   drivers/misc/cb710/sgbuf2.c:108:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(miter->addr, addr, len);
                   ^~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   58 warnings generated.
   drivers/misc/cb710/debug.c:96:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:96:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
>> drivers/misc/cb710/debug.c:96:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:96:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(8)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:97:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:97:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:97:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:97:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(16)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:98:1: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:98:1: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:94:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_READ_AND_DUMP_REGS_TEMPLATE(t)
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:86:2: note: expanded from macro 'CB710_READ_AND_DUMP_REGS_TEMPLATE'
           memset(&regs, 0, sizeof(regs));                                 \
           ^~~~~~
   drivers/misc/cb710/debug.c:98:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   drivers/misc/cb710/debug.c:98:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   CB710_REG_ACCESS_TEMPLATES(32)
   ^
   drivers/misc/cb710/debug.c:93:3: note: expanded from macro 'CB710_REG_ACCESS_TEMPLATES'
     CB710_DUMP_REGS_TEMPLATE(t)                   \
     ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/misc/cb710/debug.c:72:10: note: expanded from macro 'CB710_DUMP_REGS_TEMPLATE'
                                   p += sprintf(p, format, reg[j]);        \
                                        ^~~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
   fs/ntfs/logfile.c:373:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(trp, rp, le32_to_cpu(rp->system_page_size));
                   ^~~~~~
   fs/ntfs/logfile.c:373:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(trp, rp, le32_to_cpu(rp->system_page_size));
                   ^~~~~~
   fs/ntfs/logfile.c:380:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(trp, rp, size);
--
   irq_level, 
   phys_reg_addr, 
   idle_mode, 
   max_frame_size, 
   rbuf_fill_level, 
   rx_pio, 
   if_mode, 
   base_clock, 
   xsync, 
   xctrl, 
   init_error, 
   tx_count, 
   dcd_chkcount, 
   cts_chkcount, 
   dsr_chkcount, 
   ri_chkcount, 
   rbuf_count, 
   rbuf_current, 
   rbuf_index, 
   rbuf_fill_index, 
   tbuf_count, 
   tbuf_current, 
   tbuf_start, 
   tmp_rbuf_count, 
   netcount, 
   input_signal_events, 
   icount, 
   rbuf_fill_count, 
   bh_requested, 
   bh_running, 
   irq_requested, 
   irq_occurred, 
   reg_addr_requested, 
   rx_enabled, 
   rx_restart, 
   tx_enabled, 
   tx_active, 
   signals, 
   drop_rts_on_tx_done, 
   device_name, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct slgt_info {
   ~~~~~~~^~~~~~~~~~~
   drivers/tty/synclink_gt.c:212:8: note: Excessive padding in 'struct slgt_info' (46 padding bytes, where 6 is optimal). Optimal fields order: if_ptr, next_device, pdev, gpio_wait_q, irq_flags, reg_addr, tx_buf, flag_buf, bufs, bufs_dma_addr, rbufs, tbufs, tmp_rbuf, port_array, params, lock, netlock, task, status_event_wait_q, event_wait_q, tx_timer, rx_timer, port, magic, port_count, adapter_num, port_num, line, timeout, x_char, read_status_mask, ignore_status_mask, gpio_present, pending_bh, isr_overflow, bus_type, irq_level, phys_reg_addr, idle_mode, max_frame_size, rbuf_fill_level, rx_pio, if_mode, base_clock, xsync, xctrl, init_error, tx_count, dcd_chkcount, cts_chkcount, dsr_chkcount, ri_chkcount, rbuf_count, rbuf_current, rbuf_index, rbuf_fill_index, tbuf_count, tbuf_current, tbuf_start, tmp_rbuf_count, netcount, input_signal_events, icount, rbuf_fill_count, bh_requested, bh_running, irq_requested, irq_occurred, reg_addr_requested, rx_enabled, rx_restart, tx_enabled, tx_active, signals, drop_rts_on_tx_done, device_name, consider reordering the fields or adding explicit padding members
   struct slgt_info {
   ~~~~~~~^~~~~~~~~~~
   drivers/tty/synclink_gt.c:1190:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|RTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1190:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|RTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1192:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|CTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1192:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|CTS");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1194:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|DTR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1194:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|DTR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1196:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|DSR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1196:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|DSR");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1198:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|CD");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1198:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|CD");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1200:3: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcat(stat_buf, "|RI");
                   ^~~~~~
   drivers/tty/synclink_gt.c:1200:3: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                   strcat(stat_buf, "|RI");
                   ^~~~~~
   drivers/tty/synclink_gt.c:2352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&info->icount, 0, sizeof(info->icount));
           ^~~~~~
   drivers/tty/synclink_gt.c:2352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&info->icount, 0, sizeof(info->icount));
           ^~~~~~
   drivers/tty/synclink_gt.c:2515:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info->icount, 0, sizeof(info->icount));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2515:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info->icount, 0, sizeof(info->icount));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2544:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:2544:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&info->params, &tmp_params, sizeof(MGSL_PARAMS));
                   ^~~~~~
>> drivers/tty/synclink_gt.c:3430:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
           ^~~~~~~
   drivers/tty/synclink_gt.c:3430:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->device_name, "%s%d", tty_dev_prefix, info->line);
           ^~~~~~~
   drivers/tty/synclink_gt.c:3507:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3507:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&info->params,&default_params,sizeof(MGSL_PARAMS));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3554:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
                   ^~~~~~
   drivers/tty/synclink_gt.c:3554:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(port_array[i]->port_array, port_array, sizeof(port_array));
                   ^~~~~~
   drivers/tty/synclink_gt.c:4646:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(p, info->rbufs[i].buf, partial_count);
                                   ^~~~~~
   drivers/tty/synclink_gt.c:4646:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(p, info->rbufs[i].buf, partial_count);
                                   ^~~~~~
   drivers/tty/synclink_gt.c:4820:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(d->buf, buf, count);
                   ^~~~~~
   drivers/tty/synclink_gt.c:4820:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(d->buf, buf, count);
                   ^~~~~~
   drivers/tty/synclink_gt.c:4959:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&params, &info->params, sizeof(params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4959:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&params, &info->params, sizeof(params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4971:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
           ^~~~~~
   drivers/tty/synclink_gt.c:4971:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(info->tmp_rbuf, 0, TESTFRAMESIZE);
           ^~~~~~
   drivers/tty/synclink_gt.c:4999:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&info->params, &params, sizeof(info->params));
           ^~~~~~
   drivers/tty/synclink_gt.c:4999:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&info->params, &params, sizeof(info->params));
           ^~~~~~
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   74 warnings generated.
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:439:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:439:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:563:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:563:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:695:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:695:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:876:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:876:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&params, 0, sizeof(params));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:981:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&allocation, 0, sizeof(allocation));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:981:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&allocation, 0, sizeof(allocation));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1054:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&clk, 0, sizeof(clk));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1054:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&clk, 0, sizeof(clk));
           ^~~~~~
   drivers/gpu/drm/amd/amdgpu/../display/dc/bios/command_table.c:1124:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&clk, 0, sizeof(clk));
--
           ^~~~~~
   net/tls/tls_sw.c:2533:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(cctx->iv + salt_size, iv, iv_size);
           ^~~~~~
   net/tls/tls_sw.c:2533:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(cctx->iv + salt_size, iv, iv_size);
           ^~~~~~
   net/tls/tls_sw.c:2571:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&cb, 0, sizeof(cb));
                   ^~~~~~
   net/tls/tls_sw.c:2571:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&cb, 0, sizeof(cb));
                   ^~~~~~
   Suppressed 116 warnings (116 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   55 warnings generated.
   drivers/regulator/ltc3676.c:76:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:76:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:77:6: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           int dcdc = rdev_get_id(rdev);
               ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:77:6: note: Value stored to 'dcdc' during its initialization is never read
           int dcdc = rdev_get_id(rdev);
               ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:94:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:94:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:96:6: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           int dcdc = rdev_get_id(rdev);
               ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:96:6: note: Value stored to 'dcdc' during its initialization is never read
           int dcdc = rdev_get_id(rdev);
               ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:121:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:121:17: note: Value stored to 'dev' during its initialization is never read
           struct device *dev = ltc3676->dev;
                          ^~~   ~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:122:11: warning: Value stored to 'dcdc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           int ret, dcdc = rdev_get_id(rdev);
                    ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:122:11: note: Value stored to 'dcdc' during its initialization is never read
           int ret, dcdc = rdev_get_id(rdev);
                    ^~~~   ~~~~~~~~~~~~~~~~~
   drivers/regulator/ltc3676.c:314:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(descs, ltc3676_regulators, sizeof(ltc3676_regulators));
           ^~~~~~
   drivers/regulator/ltc3676.c:314:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(descs, ltc3676_regulators, sizeof(ltc3676_regulators));
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   127 warnings generated.
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(adapter->mac_addr, netdev->dev_addr, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:358:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(adapter->mac_addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:466:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ppid->id, ahw->phys_port_id, ppid->id_len);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: warning: Value stored to 'num_msix' is never read [clang-analyzer-deadcode.DeadStores]
                   num_msix = adapter->ahw->num_msix;
                   ^          ~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:861:3: note: Value stored to 'num_msix' is never read
                   num_msix = adapter->ahw->num_msix;
                   ^          ~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1047:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&adapter->npars[j].mac, &pci_info[i].mac, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1215:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(name, "%pM Gigabit Ethernet", adapter->mac_addr);
                   ^~~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(name, "%pM: %s" , adapter->mac_addr,
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1217:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(name, "%pM: %s" , adapter->mac_addr,
                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nic_info, 0, sizeof(struct qlcnic_info));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nic_info, 0, sizeof(struct qlcnic_info));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: warning: Value stored to 'priv_level' is never read [clang-analyzer-deadcode.DeadStores]
           priv_level = QLC_DEV_GET_DRV(op_mode, adapter->ahw->pci_func);
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1448:2: note: Value stored to 'priv_level' is never read
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1494:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&esw_cfg, 0, sizeof(struct qlcnic_esw_func_cfg));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&nic_info, 0, sizeof(struct qlcnic_info));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1559:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&nic_info, 0, sizeof(struct qlcnic_info));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1741:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1745:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                                   snprintf(sds_ring->name,
                                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           snprintf(sds_ring->name,
                                           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1750:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                           snprintf(sds_ring->name,
                                           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   snprintf(tx_ring->name, sizeof(tx_ring->name),
                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:1770:5: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                                   snprintf(tx_ring->name, sizeof(tx_ring->name),
                                   ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&adapter->stats, 0, sizeof(adapter->stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2083:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&adapter->stats, 0, sizeof(adapter->stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2602:3: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
                   qlcnic_dcb_get_info(adapter->dcb);
                   ^                   ~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:6: note: Assuming 'err' is 0
           if (err)
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2428:2: note: Taking false branch
           if (err)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:6: note: Assuming the condition is false
           if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2431:2: note: Taking false branch
           if (!(pci_resource_flags(pdev, 0) & IORESOURCE_MEM)) {
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: 64 is equal to 64
           err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
                                                       ^
   include/linux/dma-mapping.h:76:27: note: expanded from macro 'DMA_BIT_MASK'
   #define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
                             ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2436:46: note: '?' condition is true
           err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64));
                                                       ^
   include/linux/dma-mapping.h:76:26: note: expanded from macro 'DMA_BIT_MASK'
   #define DMA_BIT_MASK(n) (((n) == 64) ? ~0ULL : ((1ULL<<(n))-1))
                            ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:6: note: 'err' is 0
           if (err) {
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2437:2: note: Taking false branch
           if (err) {
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:6: note: Assuming 'err' is 0
           if (err)
               ^~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2443:2: note: Taking false branch
           if (err)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:6: note: Assuming 'ahw' is non-null
           if (!ahw) {
               ^~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_main.c:2450:2: note: Taking false branch
--
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   Suppressed 38 warnings (38 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   45 warnings generated.
   drivers/spi/spi-cadence-quadspi.c:621:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(rxbuf, &reg, read_len);
           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:621:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(rxbuf, &reg, read_len);
           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:628:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(rxbuf, &reg, read_len);
                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:628:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(rxbuf, &reg, read_len);
                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:688:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&data, txbuf, write_len);
                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:688:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&data, txbuf, write_len);
                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:695:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&data, txbuf, write_len);
                           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:695:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&data, txbuf, write_len);
                           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:799:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(rxbuf, &temp, min((unsigned int)
                                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:799:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(rxbuf, &temp, min((unsigned int)
                                   ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:1060:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&temp, txbuf, mod_bytes);
                           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:1060:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&temp, txbuf, mod_bytes);
                           ^~~~~~
   drivers/spi/spi-cadence-quadspi.c:1602:22: warning: Value stored to 'np' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct device_node *np = dev->of_node;
                               ^~   ~~~~~~~~~~~~
   drivers/spi/spi-cadence-quadspi.c:1602:22: note: Value stored to 'np' during its initialization is never read
           struct device_node *np = dev->of_node;
                               ^~   ~~~~~~~~~~~~
   Suppressed 38 warnings (38 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   108 warnings generated.
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:277:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),
           ^~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, qlcnic_get_regs_len(dev));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, qlcnic_get_regs_len(dev));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1030:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0x4e, QLCNIC_ILB_PKT_SIZE);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1032:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data + ETH_ALEN, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1033:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data + ETH_ALEN, mac, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1035:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data + 2 * ETH_ALEN, random_data, sizeof(random_data));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1162:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0, sizeof(u64) * QLCNIC_TEST_LEN);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, *qlcnic_gstrings_test,
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1202:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, *qlcnic_gstrings_test,
                   ^~~~~~
>> drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx_queue_%d %s", i,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1209:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx_queue_%d %s", i,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1216:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1224:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1229:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1234:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1241:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(data + index * ETH_GSTRING_LEN,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1249:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + index * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&tx_stats, 0, sizeof(tx_stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1314:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&tx_stats, 0, sizeof(tx_stats));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(data, 0, stats->n_stats * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1356:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(data, 0, stats->n_stats * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: warning: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index' [clang-analyzer-deadcode.DeadStores]
           for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
                          ^       ~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1358:17: note: Although the value stored to 'index' is used in the enclosing expression, the value is never actually read from 'index'
           for (ring = 0, index = 0; ring < adapter->drv_tx_rings; ring++) {
                          ^       ~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1381:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&mac_stats, 0, sizeof(struct qlcnic_mac_statistics));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1389:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&port_stats, 0, sizeof(struct qlcnic_esw_statistics));
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
           ^~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:1706:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(buffer + copy_sz, fw_dump->data, fw_dump->size);
           ^~~~~~
   include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << fls_long(n - 1);
                      ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:6: note: Assuming field 'rx_mini_pending' is 0
           if (ring->rx_mini_pending)
               ^~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:675:2: note: Taking false branch
           if (ring->rx_mini_pending)
           ^
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:678:12: note: Calling 'qlcnic_validate_ringparam'
           num_rxd = qlcnic_validate_ringparam(ring->rx_pending,
                     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qlcnic/qlcnic_ethtool.c:654:13: note: Assuming '__UNIQUE_ID___x462' is > '__UNIQUE_ID___y463'
           num_desc = max(val, min);
                      ^
   include/linux/minmax.h:52:19: note: expanded from macro 'max'
   #define max(x, y)       __careful_cmp(x, y, >)
                           ^~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
--
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2606:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                           strcpy(buf, name);
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(buf + strlen(buf), mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2636:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(buf + strlen(buf), mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(buf, mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:2638:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(buf, mem_group);
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3202:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(type_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3203:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(mem_name, big_ram->instance_name, BIG_RAM_NAME_LEN);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
                       ^~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3326:7: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   if (snprintf(mem_name, sizeof(mem_name), "tbus_%s",
                       ^~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(dump_buf + offset, 0,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3484:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(dump_buf + offset, 0,
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(hdr, 0, sizeof(*hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3732:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(hdr, 0, sizeof(*hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(reg_hdr, 0, sizeof(*reg_hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3757:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(reg_hdr, 0, sizeof(*reg_hdr));
                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(reg_hdr, 0, sizeof(*reg_hdr));
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:3820:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(reg_hdr, 0, sizeof(*reg_hdr));
                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: warning: Value stored to 'byte_buf' is never read [clang-analyzer-deadcode.DeadStores]
           byte_buf += sizeof(signature);
           ^           ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4162:2: note: Value stored to 'byte_buf' is never read
           byte_buf += sizeof(signature);
           ^           ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           memcpy(dump_buf + offset,
                                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4602:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                           memcpy(dump_buf + offset,
                                           ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:4612:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5141:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                                   memcpy(dump_buf + offset,
                                   ^~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: warning: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). 
   Optimal fields order: 
   desc, 
   vf_desc, 
   type, 
   start_addr, 
   end_addr, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct igu_fifo_addr_data {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:5895:8: note: Excessive padding in 'struct igu_fifo_addr_data' (8 padding bytes, where 0 is optimal). Optimal fields order: desc, vf_desc, type, start_addr, end_addr, consider reordering the fields or adding explicit padding members
   struct igu_fifo_addr_data {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(dest, source_str, size);
           ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6349:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(dest, source_str, size);
           ^~~~~~~
>> drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6430:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6435:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(qed_get_buf_ptr(results_buf,
                                   ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
                             ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6440:20: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           results_offset += sprintf(qed_get_buf_ptr(results_buf, results_offset),
                             ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6529:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6537:7: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6545:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6571:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6576:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6581:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                               sprintf(qed_get_buf_ptr(results_buf,
                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6585:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                       sprintf(qed_get_buf_ptr(results_buf,
                                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                               sprintf(qed_get_buf_ptr
                                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6590:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                               sprintf(qed_get_buf_ptr
                                               ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6597:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf, results_offset), "\n");
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6678:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6699:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6722:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6728:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                       sprintf(qed_get_buf_ptr(results_buf,
                       ^~~~~~~
   drivers/net/ethernet/qlogic/qed/qed_debug.c:6734:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                       sprintf(qed_get_buf_ptr(results_buf,
--
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
           if (hw->shutting_down) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
           if (hw->shutting_down) {
           ^
   drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
           if (hw->to_setup == 1) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
           if (hw->to_setup == 1) {
           ^
   drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
                           again |= get_packets_from_hw(hw);
                                    ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
           while (hw->rx_ready && !hw->blocking_rx) {
                  ^~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
   drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
           while (hw->rx_ready && !hw->blocking_rx) {
                                  ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true.  Entering loop body
           while (hw->rx_ready && !hw->blocking_rx) {
           ^
   drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
                   do_receive_packet(hw);
                   ^~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
           if (hw->hw_version == HW_VERSION_1) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
           if (hw->hw_version == HW_VERSION_1) {
           ^
   drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
                   if (len > hw->ll_mtu) {
                       ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
                   if (len > hw->ll_mtu) {
                   ^
   drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is < 'len'
                   for (i = 0; i < len; i += 2) {
                               ^~~~~~~
   drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is true.  Entering loop body
                   for (i = 0; i < len; i += 2) {
                   ^
   drivers/tty/ipwireless/hardware.c:871:15: note: Assuming 'i' is >= 'len'
                   for (i = 0; i < len; i += 2) {
                               ^~~~~~~
   drivers/tty/ipwireless/hardware.c:871:3: note: Loop condition is false. Execution continues on line 902
                   for (i = 0; i < len; i += 2) {
                   ^
   drivers/tty/ipwireless/hardware.c:904:2: note: Calling 'swap_packet_bitfield_from_le'
           swap_packet_bitfield_from_le(pkt);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:904:2: note: Returning from 'swap_packet_bitfield_from_le'
           swap_packet_bitfield_from_le(pkt);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:906:6: note: Assuming 'ipwireless_debug' is not equal to 0
           if (ipwireless_debug)
               ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:906:2: note: Taking true branch
           if (ipwireless_debug)
           ^
   drivers/tty/ipwireless/hardware.c:907:3: note: Calling 'dump_data_bytes'
                   dump_data_bytes("recv", pkt, len);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:369:10: note: Calling 'data_type'
                           type, data_type(data, length));
                                 ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:347:6: note: 'length' is not equal to 0
           if (length == 0)
               ^~~~~~
   drivers/tty/ipwireless/hardware.c:347:2: note: Taking false branch
           if (length == 0)
           ^
   drivers/tty/ipwireless/hardware.c:350:23: note: The left operand of '&' is a garbage value
           if (hdr->packet_rank & NL_FIRST_PACKET) {
               ~~~~~~~~~~~~~~~~ ^
>> drivers/tty/ipwireless/hardware.c:368:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
           ^~~~~~~
   drivers/tty/ipwireless/hardware.c:368:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(prefix, IPWIRELESS_PCCARD_NAME ": %s %s ",
           ^~~~~~~
   drivers/tty/ipwireless/hardware.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(pkt.rawpkt + header_size,
           ^~~~~~
   drivers/tty/ipwireless/hardware.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(pkt.rawpkt + header_size,
           ^~~~~~
   drivers/tty/ipwireless/hardware.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(packet, old_packet,
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(packet, old_packet,
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:657:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((unsigned char *)(*assem) +
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:657:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((unsigned char *)(*assem) +
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:679:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:679:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((unsigned char *)packet + sizeof(struct ipw_rx_packet),
                   ^~~~~~
   drivers/tty/ipwireless/hardware.c:815:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
           unsigned int protocol = packet->hdr.protocol;
           ^
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:1014:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:1015:6: note: Assuming field 'shutting_down' is 0
           if (hw->shutting_down) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1015:2: note: Taking false branch
           if (hw->shutting_down) {
           ^
   drivers/tty/ipwireless/hardware.c:1020:6: note: Assuming field 'to_setup' is not equal to 1
           if (hw->to_setup == 1) {
               ^~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:1020:2: note: Taking false branch
           if (hw->to_setup == 1) {
           ^
   drivers/tty/ipwireless/hardware.c:1040:13: note: Calling 'get_packets_from_hw'
                           again |= get_packets_from_hw(hw);
                                    ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:240:2: note: expanded from macro 'raw_spin_lock_irqsave'
           do {                                            \
           ^
   drivers/tty/ipwireless/hardware.c:934:2: note: Loop condition is false.  Exiting loop
           spin_lock_irqsave(&hw->lock, flags);
           ^
   include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
   #define spin_lock_irqsave(lock, flags)                          \
                                                                   ^
   drivers/tty/ipwireless/hardware.c:935:9: note: Assuming field 'rx_ready' is not equal to 0
           while (hw->rx_ready && !hw->blocking_rx) {
                  ^~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:9: note: Left side of '&&' is true
   drivers/tty/ipwireless/hardware.c:935:25: note: Assuming field 'blocking_rx' is 0
           while (hw->rx_ready && !hw->blocking_rx) {
                                  ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:935:2: note: Loop condition is true.  Entering loop body
           while (hw->rx_ready && !hw->blocking_rx) {
           ^
   drivers/tty/ipwireless/hardware.c:940:3: note: Calling 'do_receive_packet'
                   do_receive_packet(hw);
                   ^~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:6: note: Assuming field 'hw_version' is equal to HW_VERSION_1
           if (hw->hw_version == HW_VERSION_1) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:862:2: note: Taking true branch
           if (hw->hw_version == HW_VERSION_1) {
           ^
   drivers/tty/ipwireless/hardware.c:864:7: note: Assuming 'len' is <= field 'll_mtu'
                   if (len > hw->ll_mtu) {
                       ^~~~~~~~~~~~~~~~
   drivers/tty/ipwireless/hardware.c:864:3: note: Taking false branch
--
                                                          ^
   include/linux/log2.h:161:2: note: expanded from macro 'ilog2'
           (sizeof(n) <= 4) ?              \
           ^
   drivers/net/ethernet/mellanox/mlx4/srq.c:188:49: note: Calling '__ilog2_u32'
           srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
                                                          ^
   include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
           __ilog2_u32(n) :                \
           ^
   include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
   #define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
                                             ~~~~~~~~~~^~~
   include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
           (__builtin_constant_p((__u32)(x)) ?     \
                                         ^
   include/linux/log2.h:24:2: note: Returning the value -1
           return fls(n) - 1;
           ^~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/srq.c:188:49: note: Returning from '__ilog2_u32'
           srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
                                                          ^
   include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
           __ilog2_u32(n) :                \
           ^
   include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
   #define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
                                             ~~~~~~~~~~^~~
   include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
           (__builtin_constant_p((__u32)(x)) ?     \
                                         ^
   drivers/net/ethernet/mellanox/mlx4/srq.c:188:65: note: The result of the left shift is undefined because the left operand is negative
           srq_context->state_logsize_srqn = cpu_to_be32((ilog2(srq->max) << 24) |
                                                                          ^
   include/linux/byteorder/generic.h:94:21: note: expanded from macro 'cpu_to_be32'
   #define cpu_to_be32 __cpu_to_be32
                       ^
   include/uapi/linux/byteorder/little_endian.h:40:53: note: expanded from macro '__cpu_to_be32'
   #define __cpu_to_be32(x) ((__force __be32)__swab32((x)))
                                             ~~~~~~~~~~^~~
   include/uapi/linux/swab.h:118:32: note: expanded from macro '__swab32'
           (__builtin_constant_p((__u32)(x)) ?     \
                                         ^
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   55 warnings generated.
   drivers/gpu/drm/msm/disp/dpu1/dpu_hw_sspp.c:705:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(sspp_name, sizeof(sspp_name), "%d", hw_pipe->idx);
           ^~~~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_hw_sspp.c:705:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(sspp_name, sizeof(sspp_name), "%d", hw_pipe->idx);
           ^~~~~~~~
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
   Suppressed 53 warnings (53 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   94 warnings generated.
   Suppressed 94 warnings (94 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   137 warnings generated.
   drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:768:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(err_msg_was_printed, 0, sizeof(err_msg_was_printed));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
           ^~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1644:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(lio->ptp_info.name, 16, "%s", netdev->name);
           ^~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1698:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                   strncpy(fw_type, tmp_fw_type, sizeof(fw_type));
                   ^~~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1703:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(fw_name, "%s%s%s_%s%s", LIO_FW_DIR, LIO_FW_BASE_NAME,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1950:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:1966:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(((u8 *)mc) + 2, ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2000:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2011:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy((u8 *)&nctrl.udd[0] + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2027:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(((u8 *)&lio->linfo.hw_addr) + 2, addr->sa_data, ETH_ALEN);
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ndata, 0, sizeof(struct octnic_data_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2338:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ndata, 0, sizeof(struct octnic_data_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(g->sg, 0, g->sg_size);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(g->sg, 0, g->sg_size);
                   ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2561:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2590:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2815:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2940:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ivi, 0, sizeof(struct ifla_vf_info));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:2976:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ivi, 0, sizeof(struct ifla_vf_info));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_main.c:3098:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
--
   drivers/uio/uio_aec.c:50:3: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
                   status = ioread8(dev_info->priv + MAILBOX);
                   ^
   drivers/uio/uio_aec.c:50:3: note: Value stored to 'status' is never read
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   37 warnings generated.
   drivers/vfio/pci/vfio_pci_core.c:1280:9: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
                           mm = mmap_vma->vma->vm_mm;
                                ^
   drivers/vfio/pci/vfio_pci_core.c:644:6: note: Assuming the condition is false
           if (cmd == VFIO_DEVICE_GET_INFO) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:644:2: note: Taking false branch
           if (cmd == VFIO_DEVICE_GET_INFO) {
           ^
   drivers/vfio/pci/vfio_pci_core.c:701:13: note: Assuming the condition is false
           } else if (cmd == VFIO_DEVICE_GET_REGION_INFO) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:701:9: note: Taking false branch
           } else if (cmd == VFIO_DEVICE_GET_REGION_INFO) {
                  ^
   drivers/vfio/pci/vfio_pci_core.c:846:13: note: Assuming the condition is false
           } else if (cmd == VFIO_DEVICE_GET_IRQ_INFO) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:846:9: note: Taking false branch
           } else if (cmd == VFIO_DEVICE_GET_IRQ_INFO) {
                  ^
   drivers/vfio/pci/vfio_pci_core.c:882:13: note: Assuming the condition is false
           } else if (cmd == VFIO_DEVICE_SET_IRQS) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:882:9: note: Taking false branch
           } else if (cmd == VFIO_DEVICE_SET_IRQS) {
                  ^
   drivers/vfio/pci/vfio_pci_core.c:917:13: note: Assuming the condition is true
           } else if (cmd == VFIO_DEVICE_RESET) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:917:9: note: Taking true branch
           } else if (cmd == VFIO_DEVICE_RESET) {
                  ^
   drivers/vfio/pci/vfio_pci_core.c:920:7: note: Assuming field 'reset_works' is true
                   if (!vdev->reset_works)
                       ^~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:920:3: note: Taking false branch
                   if (!vdev->reset_works)
                   ^
   drivers/vfio/pci/vfio_pci_core.c:923:3: note: Calling 'vfio_pci_zap_and_down_write_memory_lock'
                   vfio_pci_zap_and_down_write_memory_lock(vdev);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:1330:2: note: Calling 'vfio_pci_zap_and_vma_lock'
           vfio_pci_zap_and_vma_lock(vdev, false);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:1267:2: note: Loop condition is true.  Entering loop body
           while (1) {
           ^
   drivers/vfio/pci/vfio_pci_core.c:1270:7: note: 'try' is false
                   if (try) {
                       ^~~
   drivers/vfio/pci/vfio_pci_core.c:1270:3: note: Taking false branch
                   if (try) {
                   ^
   drivers/vfio/pci/vfio_pci_core.c:1276:3: note: Loop condition is true.  Entering loop body
                   while (!list_empty(&vdev->vma_list)) {
                   ^
   drivers/vfio/pci/vfio_pci_core.c:1281:8: note: Assuming the condition is false
                           if (mmget_not_zero(mm))
                               ^~~~~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:1281:4: note: Taking false branch
                           if (mmget_not_zero(mm))
                           ^
   drivers/vfio/pci/vfio_pci_core.c:1285:4: note: Memory is released
                           kfree(mmap_vma);
                           ^~~~~~~~~~~~~~~
   drivers/vfio/pci/vfio_pci_core.c:1276:3: note: Loop condition is true.  Entering loop body
                   while (!list_empty(&vdev->vma_list)) {
                   ^
   drivers/vfio/pci/vfio_pci_core.c:1280:9: note: Use of memory after it is freed
                           mm = mmap_vma->vma->vm_mm;
                                ^~~~~~~~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   107 warnings generated.
>> drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->bus_info, "%s", pdev->name);
           ^~~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:106:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->bus_info, "%s", pdev->name);
           ^~~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:198:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(p, gstrings_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:203:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(p, gstrings_extd_stats[i].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_ethtool.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(pdata->extd_stats, 0, XGENE_EXTD_STATS_LEN * sizeof(u64));
           ^~~~~~
   Suppressed 103 warnings (103 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   110 warnings generated.
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:184:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:573:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:583:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:624:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(buf, 0, sizeof(buf));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
           offset = CLE_PORT_OFFSET;
           ^
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:736:2: note: Value stored to 'offset' is never read
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:791:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(dbptr, 0, sizeof(struct xgene_cle_dbptr) * DB_MAX_PTRS);
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&kn, 0, sizeof(kn));
           ^~~~~~
   drivers/net/ethernet/apm/xgene/xgene_enet_cle.c:806:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&kn, 0, sizeof(kn));
           ^~~~~~
   Suppressed 103 warnings (103 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   51 warnings generated.
   drivers/media/dvb-frontends/sp887x.c:178:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&buf[2], mem + i, c);
                   ^~~~~~
   drivers/media/dvb-frontends/sp887x.c:178:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&buf[2], mem + i, c);
                   ^~~~~~
   drivers/media/dvb-frontends/sp887x.c:456:39: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
                  (sp887x_readreg(state, 0xc07) << 6);
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
   drivers/media/dvb-frontends/sp887x.c:456:10: note: Calling 'sp887x_readreg'
                  (sp887x_readreg(state, 0xc07) << 6);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/media/dvb-frontends/sp887x.c:84:6: note: Assuming the condition is true
           if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/media/dvb-frontends/sp887x.c:84:2: note: Taking true branch
           if ((ret = i2c_transfer(state->i2c, msg, 2)) != 2) {
           ^
   drivers/media/dvb-frontends/sp887x.c:85:3: note: Loop condition is false.  Exiting loop
                   printk("%s: readreg error (ret == %i)\n", __func__, ret);
                   ^
   include/linux/printk.h:446:26: note: expanded from macro 'printk'
   #define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
                            ^
   include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
                   __printk_index_emit(_fmt, NULL, NULL);                  \
                   ^
   include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
   #define __printk_index_emit(...) do {} while (0)
                                    ^
   drivers/media/dvb-frontends/sp887x.c:86:3: note: Returning the value -1
                   return -1;
                   ^~~~~~~~~
   drivers/media/dvb-frontends/sp887x.c:456:10: note: Returning from 'sp887x_readreg'
                  (sp887x_readreg(state, 0xc07) << 6);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/media/dvb-frontends/sp887x.c:456:39: note: The result of the left shift is undefined because the left operand is negative
                  (sp887x_readreg(state, 0xc07) << 6);
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^
   drivers/media/dvb-frontends/sp887x.c:583:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
           ^~~~~~
   drivers/media/dvb-frontends/sp887x.c:583:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&state->frontend.ops, &sp887x_ops, sizeof(struct dvb_frontend_ops));
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   164 warnings generated.
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(content, ' ', len);
           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:428:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(content, ' ', len);
           ^~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           strncpy(pos, result[i], strlen(result[i]));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:431:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                           strncpy(pos, result[i], strlen(result[i]));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           strncpy(pos, items[i].name, strlen(items[i].name));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:433:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                           strncpy(pos, items[i].name, strlen(items[i].name));
                           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%d", i);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:466:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%d", i);
           ^~~~~~~
>> drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s", dim_state_str[dim->state]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:467:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s", dim_state_str[dim->state]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->profile_ix);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:468:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->profile_ix);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:469:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s", dim_cqe_mode_str[dim->mode]);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%s",
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:470:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%s",
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->steps_left);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:472:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->steps_left);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->steps_right);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:473:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->steps_right);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", dim->tired);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:474:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", dim->tired);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", coal->int_gl);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:475:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", coal->int_gl);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", coal->int_ql);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:476:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", coal->int_ql);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(result[j++], "%u", reg_val);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:479:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(result[j++], "%u", reg_val);
           ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%u", reg_val);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:483:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%u", reg_val);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "NA");
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:485:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "NA");
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%8u", i);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%8u", i);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%9u", ring->tx_copybreak);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:566:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%9u", ring->tx_copybreak);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->len);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:567:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->len);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->next_to_use);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:568:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->next_to_use);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(result[j++], "%3u", tx_spare->next_to_clean);
                   ^~~~~~~
   drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c:569:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(result[j++], "%3u", tx_spare->next_to_clean);
--
           ^
   drivers/media/rc/rc-main.c:389:32: note: The left operand of '==' is a garbage value
                   if (rc_map->scan[i].scancode == scancode)
                       ~~~~~~~~~~~~~~~~~~~~~~~~ ^
   drivers/media/rc/rc-main.c:405:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(&rc_map->scan[i + 1], &rc_map->scan[i],
                   ^~~~~~~
   drivers/media/rc/rc-main.c:405:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(&rc_map->scan[i + 1], &rc_map->scan[i],
                   ^~~~~~~
   drivers/media/rc/rc-main.c:573:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(ke->scancode, &entry->scancode, sizeof(entry->scancode));
                   ^~~~~~
   drivers/media/rc/rc-main.c:573:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(ke->scancode, &entry->scancode, sizeof(entry->scancode));
                   ^~~~~~
   drivers/media/rc/rc-main.c:1126:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           tmp += sprintf(tmp, "[%s] ", proto_names[i].name);
                                  ^~~~~~~
   drivers/media/rc/rc-main.c:1126:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           tmp += sprintf(tmp, "[%s] ", proto_names[i].name);
                                  ^~~~~~~
   drivers/media/rc/rc-main.c:1128:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           tmp += sprintf(tmp, "%s ", proto_names[i].name);
                                  ^~~~~~~
   drivers/media/rc/rc-main.c:1128:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           tmp += sprintf(tmp, "%s ", proto_names[i].name);
                                  ^~~~~~~
   drivers/media/rc/rc-main.c:1388:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%#x\n", val);
                  ^~~~~~~
   drivers/media/rc/rc-main.c:1388:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%#x\n", val);
                  ^~~~~~~
   drivers/media/rc/rc-main.c:1517:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   tmp += sprintf(tmp, "[%s] ", protocols[i].name);
                                          ^~~~~~~
   drivers/media/rc/rc-main.c:1517:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   tmp += sprintf(tmp, "[%s] ", protocols[i].name);
                                          ^~~~~~~
   drivers/media/rc/rc-main.c:1519:12: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   tmp += sprintf(tmp, "%s ", protocols[i].name);
                                          ^~~~~~~
   drivers/media/rc/rc-main.c:1519:12: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   tmp += sprintf(tmp, "%s ", protocols[i].name);
                                          ^~~~~~~
   drivers/media/rc/rc-main.c:1835:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&dev->input_dev->id, &dev->input_id, sizeof(dev->input_id));
           ^~~~~~
   drivers/media/rc/rc-main.c:1835:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&dev->input_dev->id, &dev->input_id, sizeof(dev->input_id));
           ^~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   40 warnings generated.
   drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", !!(ret & attr->index));
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", !!(ret & attr->index));
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", data->name);
                  ^~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   37 warnings generated.
   Suppressed 37 warnings (37 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   20 warnings generated.
   Suppressed 20 warnings (20 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   drivers/hwmon/scpi-hwmon.c:109:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "%lld\n", (s64)value);
                          ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:109:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "%lld\n", (s64)value);
                          ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:111:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%llu\n", value);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:111:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%llu\n", value);
                  ^~~~~~~
>> drivers/hwmon/scpi-hwmon.c:121:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", sensor->info.name);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:121:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", sensor->info.name);
                  ^~~~~~~
   drivers/hwmon/scpi-hwmon.c:190:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:190:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:192:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:192:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:197:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:197:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:199:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:199:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:204:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:204:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:206:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:206:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:211:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:211:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:213:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:213:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:218:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:218:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->input, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:220:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   drivers/hwmon/scpi-hwmon.c:220:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(sensor->label, sizeof(sensor->input),
                           ^~~~~~~~
   Suppressed 20 warnings (20 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
   66 warnings generated.
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&status, 0, sizeof(struct dpu_danger_safe_status));
           ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:66:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&status, 0, sizeof(struct dpu_danger_safe_status));
           ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:566:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   drivers/gpu/drm/msm/disp/dpu1/dpu_kms.c:620:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&info, 0, sizeof(info));
                   ^~~~~~
   Suppressed 63 warnings (63 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   Suppressed 54 warnings (54 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   drivers/hwmon/max6697.c:265:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", temp * 125);
                  ^~~~~~~
   drivers/hwmon/max6697.c:265:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", temp * 125);
                  ^~~~~~~
   drivers/hwmon/max6697.c:282:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", temp * 1000);
                  ^~~~~~~
   drivers/hwmon/max6697.c:282:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", temp * 1000);
                  ^~~~~~~
   drivers/hwmon/max6697.c:297:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
                  ^~~~~~~
   drivers/hwmon/max6697.c:297:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", (data->alarms >> index) & 0x1);
                  ^~~~~~~
   drivers/hwmon/max6697.c:388:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return ret < 0 ? ret : sprintf(buf, "%d\n", max6581_offset_to_millic(ret));
                                  ^~~~~~~
   drivers/hwmon/max6697.c:388:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return ret < 0 ? ret : sprintf(buf, "%d\n", max6581_offset_to_millic(ret));
                                  ^~~~~~~
   drivers/hwmon/max6697.c:628:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&p, 0, sizeof(p));
                   ^~~~~~
   drivers/hwmon/max6697.c:628:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&p, 0, sizeof(p));
                   ^~~~~~
   Suppressed 49 warnings (48 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   181 warnings generated.
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:444:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:446:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:460:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(drvinfo, 0, sizeof(struct ethtool_drvinfo));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:462:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->fw_version, oct->fw_info.liquidio_firmware_version,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:464:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(drvinfo->bus_info, pci_name(oct->pci_dev), 32);
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:475:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
>> drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
                 ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:675:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           len = sprintf(buf, "boardname:%s serialnum:%s maj:%lld min:%lld\n",
                 ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf((char *)bytes,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:695:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf((char *)bytes,
           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:737:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1391:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&nctrl, 0, sizeof(struct octnic_ctrl_pkt));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_priv_flags_strings[i]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1839:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_priv_flags_strings[i]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1863:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1872:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1883:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(data, "%s", oct_vf_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1911:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(data, "%s", oct_vf_stats_strings[j]);
                           ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1920:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "tx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:1931:5: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                                   sprintf(data, "rx-%d-%s", i,
                                   ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(resp, 0, sizeof(struct oct_intrmod_resp));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2017:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(resp, 0, sizeof(struct oct_intrmod_resp));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2049:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(intr_cfg, &resp->intrmod, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2075:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(cfg, intr_cfg, sizeof(struct oct_intrmod_cfg));
           ^~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
           ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2466:2: note: Value stored to 'ret' is never read
           ret = oct_cfg_adaptive_intr(lio, &intrmod, intr_coal);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
                  ^~~~~~~
   drivers/net/ethernet/cavium/liquidio/lio_ethtool.c:2554:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           len += sprintf(s + len, "\n\t Octeon CSR Registers\n\n");
--
           ^~~~~~
   drivers/message/fusion/mptbase.c:5885:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5886:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5886:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:5931:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5931:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&sas_address, &buffer->Path[i].WWID, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5933:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5933:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&phys_disk->Path[i].WWID, &sas_address, sizeof(__le64));
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5934:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&sas_address,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5934:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&sas_address,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5937:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&phys_disk->Path[i].OwnerWWID,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:5937:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&phys_disk->Path[i].OwnerWWID,
                   ^~~~~~
   drivers/message/fusion/mptbase.c:6082:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(mem, (u8 *)pIoc3, iocpage3sz);
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6082:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(mem, (u8 *)pIoc3, iocpage3sz);
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6243:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6243:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6269:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6269:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_name, pbuf->BoardName, sizeof(ioc->board_name));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_assembly, pbuf->BoardAssembly, sizeof(ioc->board_assembly));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6271:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6271:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ioc->board_tracer, pbuf->BoardTracerNumber, sizeof(ioc->board_tracer));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&evn, 0, sizeof(EventNotification_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&evn, 0, sizeof(EventNotification_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&reply_buf, 0, sizeof(MPIDefaultReply_t));
           ^~~~~~
   drivers/message/fusion/mptbase.c:6396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
           ^~~~~~
   drivers/message/fusion/mptbase.c:6396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ioc->mptbase_cmds.reply, 0 , MPT_DEFAULT_FRAME_SIZE);
           ^~~~~~
   drivers/message/fusion/mptbase.c:6787:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, " (Exp %02d%02d)",
                   ^~~~~~~
   drivers/message/fusion/mptbase.c:6787:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, " (Exp %02d%02d)",
                   ^~~~~~~
   drivers/message/fusion/mptbase.c:6793:4: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcat(buf, " [MDBG]");
                           ^~~~~~
   drivers/message/fusion/mptbase.c:6793:4: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
                           strcat(buf, " [MDBG]");
                           ^~~~~~
>> drivers/message/fusion/mptbase.c:6820:6: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
               ^~~~~~~
   drivers/message/fusion/mptbase.c:6820:6: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y = sprintf(buffer+len, "%s: %s, %s%08xh%s, Ports=%d, MaxQ=%d",
               ^~~~~~~
   drivers/message/fusion/mptbase.c:6831:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6831:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   y += sprintf(buffer+len+y, ", LanAddr=%pMR", a);
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6834:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6834:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y += sprintf(buffer+len+y, ", IRQ=%d", ioc->pci_irq);
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6837:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   y += sprintf(buffer+len+y, " (disabled)");
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6837:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   y += sprintf(buffer+len+y, " (disabled)");
                        ^~~~~~~
   drivers/message/fusion/mptbase.c:6839:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           y += sprintf(buffer+len+y, "\n");
                ^~~~~~~
   drivers/message/fusion/mptbase.c:6839:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           y += sprintf(buffer+len+y, "\n");
                ^~~~~~~
   drivers/message/fusion/mptbase.c:7025:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7025:2: note: Value stored to 'time_count' is never read
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7174:3: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
                   time_count = jiffies;
                   ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7174:3: note: Value stored to 'time_count' is never read
                   time_count = jiffies;
                   ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7197:2: warning: Value stored to 'time_count' is never read [clang-analyzer-deadcode.DeadStores]
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7197:2: note: Value stored to 'time_count' is never read
           time_count = jiffies;
           ^            ~~~~~~~
   drivers/message/fusion/mptbase.c:7787:8: warning: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii' [clang-analyzer-deadcode.DeadStores]
                   if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
                        ^    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptbase.c:7787:8: note: Although the value stored to 'ii' is used in the enclosing expression, the value is never actually read from 'ii'
                   if ((ii = SendEventAck(ioc, pEventReply)) != 0) {
                        ^    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptbase.c:8175:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(extend_desc, EVENT_DESCR_STR_SZ,
           ^~~~~~~~
   drivers/message/fusion/mptbase.c:8175:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(extend_desc, EVENT_DESCR_STR_SZ,
           ^~~~~~~~
   Suppressed 56 warnings (50 in non-user code, 6 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   54 warnings generated.
   drivers/char/virtio_console.c:682:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((__force char *)out_buf, buf->buf + buf->offset,
                   ^~~~~~
   drivers/char/virtio_console.c:682:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((__force char *)out_buf, buf->buf + buf->offset,
                   ^~~~~~
   drivers/char/virtio_console.c:897:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(page_address(page) + offset, src + buf->offset, len);
                   ^~~~~~
   drivers/char/virtio_console.c:897:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(page_address(page) + offset, src + buf->offset, len);
                   ^~~~~~
   drivers/char/virtio_console.c:1283:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buffer, "%s\n", port->name);
                  ^~~~~~~
   drivers/char/virtio_console.c:1283:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buffer, "%s\n", port->name);
                  ^~~~~~~
   drivers/char/virtio_console.c:1464:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
           ^~~~~~~~
   drivers/char/virtio_console.c:1464:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
           ^~~~~~~~
   drivers/char/virtio_console.c:1625:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
                   ^~~~~~
   drivers/char/virtio_console.c:1625:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
                   ^~~~~~
   drivers/char/virtio_console.c:1673:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
                   ^~~~~~~
   drivers/char/virtio_console.c:1673:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
                   strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
--
   drivers/media/dvb-frontends/ds3000.c:711:2: note: Loop condition is false. Execution continues on line 714
           for (i = 0; i < d->msg_len; i++)
           ^
   drivers/media/dvb-frontends/ds3000.c:720:28: note: The result of the left shift is undefined because the left operand is negative
           data |= ((d->msg_len - 1) << 3) | 0x07;
                    ~~~~~~~~~~~~~~~~ ^
   drivers/media/dvb-frontends/ds3000.c:850:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&state->frontend.ops, &ds3000_ops,
           ^~~~~~
   drivers/media/dvb-frontends/ds3000.c:850:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&state->frontend.ops, &ds3000_ops,
           ^~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   Suppressed 38 warnings (38 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   drivers/fpga/zynqmp-fpga.c:55:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(kbuf, buf, size);
           ^~~~~~
   drivers/fpga/zynqmp-fpga.c:55:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(kbuf, buf, size);
           ^~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   18 warnings generated.
   drivers/fpga/altera-pr-ip-core.c:188:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
           val = readl(priv->reg_base + ALT_PR_CSR_OFST);
           ^
   drivers/fpga/altera-pr-ip-core.c:188:2: note: Value stored to 'val' is never read
   Suppressed 17 warnings (17 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   44 warnings generated.
   drivers/fpga/dfl-fme-main.c:88:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:88:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:103:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:103:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:118:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:118:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:288:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:288:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:492:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", xeon_limit * 100000);
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:492:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", xeon_limit * 100000);
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:507:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", fpga_limit * 100000);
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:507:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", fpga_limit * 100000);
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:518:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:518:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n",
                  ^~~~~~~
   drivers/fpga/dfl-fme-main.c:622:26: warning: Value stored to 'pdev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct platform_device *pdev = pdata->dev;
                                   ^~~~   ~~~~~~~~~~
   drivers/fpga/dfl-fme-main.c:622:26: note: Value stored to 'pdev' during its initialization is never read
           struct platform_device *pdev = pdata->dev;
                                   ^~~~   ~~~~~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   drivers/md/dm-log-userspace-base.c:148:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
                      ^~~~~~~
   drivers/md/dm-log-userspace-base.c:148:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           str_size = sprintf(str, "%llu", (unsigned long long)ti->len);
                      ^~~~~~~
>> drivers/md/dm-log-userspace-base.c:150:15: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   str_size += sprintf(str + str_size, " %s", argv[i]);
                               ^~~~~~~
   drivers/md/dm-log-userspace-base.c:150:15: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   str_size += sprintf(str + str_size, " %s", argv[i]);
                               ^~~~~~~
   drivers/md/dm-log-userspace-base.c:226:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(lc->uuid, argv[0], DM_UUID_LEN);
           ^~~~~~~
   drivers/md/dm-log-userspace-base.c:226:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(lc->uuid, argv[0], DM_UUID_LEN);
           ^~~~~~~
   Suppressed 49 warnings (49 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   88 warnings generated.
   drivers/md/dm-log-userspace-transfer.c:61:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(msg, 0, sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:61:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(msg, 0, sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:119:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(pkg->data, tfr->data, tfr->data_size);
                           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:119:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(pkg->data, tfr->data, tfr->data_size);
                           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tfr, 0, DM_ULOG_PREALLOCED_SIZE - sizeof(struct cn_msg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:201:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tfr->uuid, uuid, DM_UUID_LEN);
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:201:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(tfr->uuid, uuid, DM_UUID_LEN);
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:215:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(tfr->data, data, data_size);
                   ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:215:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(tfr->data, data, data_size);
                   ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:217:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&pkg, 0, sizeof(pkg));
           ^~~~~~
   drivers/md/dm-log-userspace-transfer.c:217:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&pkg, 0, sizeof(pkg));
           ^~~~~~
   Suppressed 82 warnings (82 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   78 warnings generated.
   drivers/hwmon/tmp513.c:256:21: warning: The result of the right shift is undefined due to shifting by '229', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
                   max_val = U16_MAX >> tmp51x_get_pga_shift(data);
                                     ^
   drivers/hwmon/tmp513.c:422:8: note: Calling 'tmp51x_get_reg'
           reg = tmp51x_get_reg(type, attr, channel);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hwmon/tmp513.c:300:2: note: Control jumps to 'case hwmon_curr:'  at line 326
           switch (type) {
           ^
   drivers/hwmon/tmp513.c:327:3: note: Control jumps to 'case hwmon_curr_lcrit:'  at line 333
                   switch (attr) {
                   ^
   drivers/hwmon/tmp513.c:334:4: note: Returning the value 13, which participates in a condition later
                           return TMP51X_SHUNT_CURRENT_L_LIMIT;
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hwmon/tmp513.c:422:8: note: Returning from 'tmp51x_get_reg'
           reg = tmp51x_get_reg(type, attr, channel);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hwmon/tmp513.c:423:6: note: 'reg' is not equal to 0
           if (reg == 0)
               ^~~
   drivers/hwmon/tmp513.c:423:2: note: Taking false branch
           if (reg == 0)
           ^
   drivers/hwmon/tmp513.c:426:9: note: Calling 'tmp51x_set_value'
           return tmp51x_set_value(dev_get_drvdata(dev), reg, val);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hwmon/tmp513.c:248:2: note: Control jumps to 'case 13:'  at line 250
           switch (reg) {
           ^
   drivers/hwmon/tmp513.c:255:9: note: Left side of '||' is false
                   val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
                         ^
   include/linux/math.h:89:3: note: expanded from macro 'DIV_ROUND_CLOSEST'
           (((typeof(x))-1) > 0 ||                         \
            ^
   drivers/hwmon/tmp513.c:255:9: note: Left side of '||' is false
                   val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
                         ^
   include/linux/math.h:89:3: note: expanded from macro 'DIV_ROUND_CLOSEST'
           (((typeof(x))-1) > 0 ||                         \
            ^
   drivers/hwmon/tmp513.c:255:9: note: Assuming '__x' is <= 0
                   val = DIV_ROUND_CLOSEST(val * data->shunt_uohms, 10000);
--
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:1352:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(sky2->rx_le, 0, RX_LE_BYTES);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3392:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3392:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(hw->st_le, 0, hw->st_size * sizeof(struct sky2_status_le));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3497:9: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
                   imask |= portirq_msk[i];
                         ^
   drivers/net/ethernet/marvell/sky2.c:3517:2: note: Calling 'sky2_all_up'
           sky2_all_up(hw);
           ^~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3488:29: note: The value 2 is assigned to 'i'
           for (i = 0; i < hw->ports; i++) {
                                      ^~~
   drivers/net/ethernet/marvell/sky2.c:3488:14: note: Assuming 'i' is < field 'ports'
           for (i = 0; i < hw->ports; i++) {
                       ^~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3488:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < hw->ports; i++) {
           ^
   drivers/net/ethernet/marvell/sky2.c:3492:7: note: Assuming the condition is false
                   if (!netif_running(dev))
                       ^~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3492:3: note: Taking false branch
                   if (!netif_running(dev))
                   ^
   drivers/net/ethernet/marvell/sky2.c:3497:9: note: Assigned value is garbage or undefined
                   imask |= portirq_msk[i];
                         ^  ~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:3804:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + i * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3804:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + i * ETH_GSTRING_LEN,
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3855:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(filter, 0, sizeof(filter));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3855:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(filter, 0, sizeof(filter));
           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3863:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(filter, 0xff, sizeof(filter));
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:3863:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(filter, 0xff, sizeof(filter));
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4256:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(p, 0, 128);
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4256:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(p, 0, 128);
                           ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4681:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4681:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(sa.sa_data, dev->dev_addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/marvell/sky2.c:4772:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4772:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(buf, sz, "%s", name[chipid - CHIP_ID_YUKON_XL]);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4774:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(buf, sz, "(chip %#x)", chipid);
                   ^~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4774:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(buf, sz, "(chip %#x)", chipid);
                   ^~~~~~~~
>> drivers/net/ethernet/marvell/sky2.c:4896:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
           ^~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4896:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(hw->irq_name, DRV_NAME "@pci:%s", pci_name(pdev));
           ^~~~~~~
   include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << fls_long(n - 1);
                      ^
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Assuming the condition is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
   drivers/net/ethernet/marvell/sky2.c:4173:6: note: Assuming field 'rx_pending' is >= 8
               ering->rx_pending < 8 ||
               ^~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^
   drivers/net/ethernet/marvell/sky2.c:4174:6: note: Assuming the condition is false
               ering->tx_pending < TX_MIN_PENDING ||
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:6: note: Left side of '||' is false
           if (ering->rx_pending > RX_MAX_PENDING ||
               ^
   drivers/net/ethernet/marvell/sky2.c:4175:6: note: Assuming field 'tx_pending' is <= TX_MAX_PENDING
               ering->tx_pending > TX_MAX_PENDING)
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4172:2: note: Taking false branch
           if (ering->rx_pending > RX_MAX_PENDING ||
           ^
   drivers/net/ethernet/marvell/sky2.c:4182:23: note: Calling 'roundup_ring_size'
           sky2->tx_ring_size = roundup_ring_size(sky2->tx_pending);
                                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/marvell/sky2.c:4148:20: note: '?' condition is false
           return max(128ul, roundup_pow_of_two(pending+1));
                             ^
   include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
           __builtin_constant_p(n) ? (             \
           ^
   drivers/net/ethernet/marvell/sky2.c:4148:20: note: Calling '__roundup_pow_of_two'
           return max(128ul, roundup_pow_of_two(pending+1));
                             ^
   include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
           __roundup_pow_of_two(n)                 \
           ^
   include/linux/minmax.h:52:36: note: expanded from macro 'max'
   #define max(x, y)       __careful_cmp(x, y, >)
                           ~~~~~~~~~~~~~~~~~^~~~~
   include/linux/minmax.h:38:17: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:32:25: note: expanded from macro '__cmp_once'
                   typeof(y) unique_y = (y);               \
                                         ^
   include/linux/log2.h:57:16: note: Calling 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/bitops.h:154:2: note: Taking false branch
           if (sizeof(l) == 4)
           ^
   include/linux/bitops.h:156:9: note: Calling 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/asm-generic/bitops/fls64.h:29:6: note: 'x' is not equal to 0
           if (x == 0)
               ^
   include/asm-generic/bitops/fls64.h:29:2: note: Taking false branch
           if (x == 0)
           ^
   include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
           return __fls(x) + 1;
           ^~~~~~~~~~~~~~~~~~~
   include/linux/bitops.h:156:9: note: Returning from 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/linux/bitops.h:156:2: note: Returning the value 64
           return fls64(l);
           ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:16: note: Returning from 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
           return 1UL << fls_long(n - 1);
                      ^  ~~~~~~~~~~~~~~~
   Suppressed 101 warnings (101 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
--
               ^~~
   drivers/hid/hid-kye.c:708:2: note: Taking false branch
           if (ret) {
           ^
   drivers/hid/hid-kye.c:714:6: note: Assuming 'ret' is 0
           if (ret) {
               ^~~
   drivers/hid/hid-kye.c:714:2: note: Taking false branch
           if (ret) {
           ^
   drivers/hid/hid-kye.c:719:2: note: Control jumps to 'case 20501:' @line 725
           switch (id->product) {
           ^
   drivers/hid/hid-kye.c:726:9: note: Calling 'kye_tablet_enable'
                   ret = kye_tablet_enable(hdev);
                         ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/hid/hid-kye.c:669:2: note: 'report' declared without an initial value
           struct hid_report *report;
           ^~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hid/hid-kye.c:673:2: note: Loop condition is false. Execution continues on line 679
           list_for_each(head, list) {
           ^
   include/linux/list.h:580:2: note: expanded from macro 'list_for_each'
           for (pos = (head)->next; !list_is_head(pos, (head)); pos = pos->next)
           ^
   drivers/hid/hid-kye.c:679:6: note: Assuming 'head' is not equal to 'list'
           if (head == list) {
               ^~~~~~~~~~~~
   drivers/hid/hid-kye.c:679:2: note: Taking false branch
           if (head == list) {
           ^
   drivers/hid/hid-kye.c:684:6: note: Access to field 'maxfield' results in a dereference of an undefined pointer value (loaded from variable 'report')
           if (report->maxfield < 1 || report->field[0]->report_count < 7) {
               ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   41 warnings generated.
   drivers/hid/hid-lenovo.c:403:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:403:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n", data->fn_lock);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:445:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:445:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:606:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:606:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->press_to_select);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:636:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:636:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->dragging);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:666:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:666:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->release_to_select);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:696:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:696:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n", data_pointer->select_right);
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:726:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:726:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:755:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:755:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, PAGE_SIZE, "%u\n",
                  ^~~~~~~~
   drivers/hid/hid-lenovo.c:876:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
           ^~~~~~~~
   drivers/hid/hid-lenovo.c:876:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(name_mute, name_sz, "%s:amber:mute", dev_name(&hdev->dev));
           ^~~~~~~~
   drivers/hid/hid-lenovo.c:877:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(name_micm, name_sz, "%s:amber:micmute", dev_name(&hdev->dev));
           ^~~~~~~~
   drivers/hid/hid-lenovo.c:877:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(name_micm, name_sz, "%s:amber:micmute", dev_name(&hdev->dev));
           ^~~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
>> drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: warning: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           if (sscanf(name, "qcom,hdmi-tx-%s", name3))
                               ^~~~~~
   drivers/gpu/drm/msm/hdmi/hdmi.c:566:8: note: Call to function 'sscanf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
                           if (sscanf(name, "qcom,hdmi-tx-%s", name3))
                               ^~~~~~
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   52 warnings generated.
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   53 warnings generated.
   drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
           ^~~~~~~~
   drivers/gpu/drm/msm/hdmi/hdmi_i2c.c:253:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(i2c->name, sizeof(i2c->name), "msm hdmi i2c");
           ^~~~~~~~
   Suppressed 52 warnings (52 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   drivers/memstick/host/tifm_ms.c:222:22: warning: The right operand of '-' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
                           kunmap_atomic(buf - p_off);
                                             ^
   drivers/memstick/host/tifm_ms.c:389:16: note: Loop condition is false.  Exiting loop
           fifo_status = readl(sock->addr + SOCK_DMA_FIFO_STATUS);
                         ^
   arch/riscv/include/asm/mmio.h:140:30: note: expanded from macro 'readl'
   #define readl(c)        ({ u32 __v; __io_br(); __v = readl_cpu(c); __io_ar(__v); __v; })
                                       ^
   arch/riscv/include/asm/mmio.h:133:19: note: expanded from macro '__io_br'
   #define __io_br()       do {} while (0)
                           ^
   drivers/memstick/host/tifm_ms.c:390:16: note: Loop condition is false.  Exiting loop
           host_status = readl(sock->addr + SOCK_MS_STATUS);
                         ^
   arch/riscv/include/asm/mmio.h:140:30: note: expanded from macro 'readl'
   #define readl(c)        ({ u32 __v; __io_br(); __v = readl_cpu(c); __io_ar(__v); __v; })
                                       ^
   arch/riscv/include/asm/mmio.h:133:19: note: expanded from macro '__io_br'
   #define __io_br()       do {} while (0)
                           ^
   drivers/memstick/host/tifm_ms.c:391:2: note: Loop condition is false.  Exiting loop
           dev_dbg(&sock->dev,
           ^
   include/linux/dev_printk.h:158:2: note: expanded from macro 'dev_dbg'
           dev_printk(KERN_DEBUG, dev, dev_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/dev_printk.h:128:3: note: expanded from macro 'dev_printk'
                   dev_printk_index_emit(level, fmt);                      \
                   ^
   include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
           printk_index_subsys_emit("%s %s: ", level, fmt)
           ^
   include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
           __printk_index_emit(fmt, level, subsys_fmt_prefix)
           ^
   include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
   #define __printk_index_emit(...) do {} while (0)
                                    ^
   drivers/memstick/host/tifm_ms.c:395:6: note: Assuming field 'req' is non-null
           if (host->req) {
               ^~~~~~~~~
   drivers/memstick/host/tifm_ms.c:395:2: note: Taking true branch
           if (host->req) {
           ^
   drivers/memstick/host/tifm_ms.c:396:7: note: Assuming field 'use_dma' is 0
                   if (host->use_dma && (fifo_status & 1)) {
                       ^~~~~~~~~~~~~
   drivers/memstick/host/tifm_ms.c:396:21: note: Left side of '&&' is false
                   if (host->use_dma && (fifo_status & 1)) {
                                     ^
   drivers/memstick/host/tifm_ms.c:400:14: note: Field 'use_dma' is 0
                   if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
                              ^
   drivers/memstick/host/tifm_ms.c:400:7: note: Left side of '&&' is true
                   if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
                       ^
   drivers/memstick/host/tifm_ms.c:400:26: note: Assuming the condition is true
                   if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
                                          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/memstick/host/tifm_ms.c:400:3: note: Taking true branch
                   if (!host->use_dma && (fifo_status & TIFM_FIFO_MORE)) {
                   ^
   drivers/memstick/host/tifm_ms.c:401:9: note: Calling 'tifm_ms_transfer_data'
                           if (!tifm_ms_transfer_data(host)) {
                                ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/memstick/host/tifm_ms.c:190:6: note: Assuming field 'long_data' is 0
           if (host->req->long_data) {
               ^~~~~~~~~~~~~~~~~~~~
   drivers/memstick/host/tifm_ms.c:190:2: note: Taking false branch
           if (host->req->long_data) {
           ^
   drivers/memstick/host/tifm_ms.c:197:2: note: Loop condition is false.  Exiting loop
           dev_dbg(&sock->dev, "fifo data transfer, %d, %d\n", length,
--
               ^~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:1269:2: note: Taking false branch
           if (hd->spi_pending) {
           ^
   drivers/message/fusion/mptspi.c:1281:3: note: Loop condition is true.  Entering loop body
                   shost_for_each_device(sdev, ioc->sh)
                   ^
   include/scsi/scsi_device.h:388:2: note: expanded from macro 'shost_for_each_device'
           for ((sdev) = __scsi_iterate_devices((shost), NULL); \
           ^
   drivers/message/fusion/mptspi.c:1282:4: note: Calling 'mptspi_dv_device'
                           mptspi_dv_device(hd, sdev);
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:690:6: note: Assuming field 'channel' is not equal to 0
           if (sdev->channel == 0 &&
               ^~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:690:25: note: Left side of '&&' is false
           if (sdev->channel == 0 &&
                                  ^
   drivers/message/fusion/mptspi.c:695:6: note: Assuming field 'channel' is not equal to 1
           if (sdev->channel == 1 &&
               ^~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:695:25: note: Left side of '&&' is false
           if (sdev->channel == 1 &&
                                  ^
   drivers/message/fusion/mptspi.c:706:6: note: Assuming field 'channel' is not equal to 1
           if (sdev->channel == 1 &&
               ^~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:706:25: note: Left side of '&&' is false
           if (sdev->channel == 1 &&
                                  ^
   drivers/message/fusion/mptspi.c:711:2: note: Calling 'mptspi_read_parameters'
           mptspi_read_parameters(sdev->sdev_target);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:600:2: note: Calling 'mptspi_read_spi_device_pg0'
           mptspi_read_spi_device_pg0(starget, &spi_dev_pg0);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:527:6: note: Assuming field 'channel' is equal to 0
           if (starget->channel == 0 &&
               ^~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:527:6: note: Left side of '&&' is true
   drivers/message/fusion/mptspi.c:528:6: note: Assuming the condition is true
               mptspi_is_raid(hd, starget->id))
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:527:2: note: Taking true branch
           if (starget->channel == 0 &&
           ^
   drivers/message/fusion/mptspi.c:529:3: note: Returning without writing to 'pass_pg0->NegotiatedParameters'
                   return -1;
                   ^
   drivers/message/fusion/mptspi.c:600:2: note: Returning from 'mptspi_read_spi_device_pg0'
           mptspi_read_spi_device_pg0(starget, &spi_dev_pg0);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptspi.c:602:7: note: Assigned value is garbage or undefined
           nego = le32_to_cpu(spi_dev_pg0.NegotiatedParameters);
                ^
   drivers/message/fusion/mptspi.c:880:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   drivers/message/fusion/mptspi.c:880:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   drivers/message/fusion/mptspi.c:887:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cfg, 0, sizeof(cfg));
           ^~~~~~
   drivers/message/fusion/mptspi.c:887:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0, sizeof(cfg));
           ^~~~~~
   drivers/message/fusion/mptspi.c:895:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(pg1, pass_pg1, size);
           ^~~~~~
   drivers/message/fusion/mptspi.c:895:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(pg1, pass_pg1, size);
           ^~~~~~
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   49 warnings generated.
   drivers/extcon/extcon-rt8973a.c:25:8: warning: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). 
   Optimal fields order: 
   name, 
   irq, 
   virq, 
   consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
   struct muic_irq {
   ~~~~~~~^~~~~~~~~~
   drivers/extcon/extcon-rt8973a.c:25:8: note: Excessive padding in 'struct muic_irq' (8 padding bytes, where 0 is optimal). Optimal fields order: name, irq, virq, consider reordering the fields or adding explicit padding members
   struct muic_irq {
   ~~~~~~~^~~~~~~~~~
   Suppressed 48 warnings (48 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   drivers/vme/bridges/vme_tsi148.c:739:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&image->bus_resource, 0, sizeof(image->bus_resource));
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:739:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&image->bus_resource, 0, sizeof(image->bus_resource));
                   ^~~~~~
>> drivers/vme/bridges/vme_tsi148.c:754:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
           ^~~~~~~
   drivers/vme/bridges/vme_tsi148.c:754:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf((char *)image->bus_resource.name, "%s.%d", tsi148_bridge->name,
           ^~~~~~~
   drivers/vme/bridges/vme_tsi148.c:786:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:786:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&image->bus_resource, 0, sizeof(image->bus_resource));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:1217:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1217:4: note: Value stored to 'done' is never read
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1237:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1237:3: note: Value stored to 'done' is never read
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1302:4: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1302:4: note: Value stored to 'done' is never read
                           done += 1;
                           ^       ~
   drivers/vme/bridges/vme_tsi148.c:1322:3: warning: Value stored to 'done' is never read [clang-analyzer-deadcode.DeadStores]
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1322:3: note: Value stored to 'done' is never read
                   done += 1;
                   ^       ~
   drivers/vme/bridges/vme_tsi148.c:1652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&entry->descriptor, 0, sizeof(entry->descriptor));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:1652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&entry->descriptor, 0, sizeof(entry->descriptor));
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2338:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(tsi148_bridge->name, driver_name);
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2338:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(tsi148_bridge->name, driver_name);
           ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2367:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&tsi148_device->flush_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2367:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&tsi148_device->flush_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2391:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&master_image->bus_resource, 0,
                   ^~~~~~
   drivers/vme/bridges/vme_tsi148.c:2391:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&master_image->bus_resource, 0,
                   ^~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   15 warnings generated.
   drivers/w1/slaves/w1_ds2431.c:240:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&tmp[addr & W1_F2D_SCRATCH_MASK], buf, copy);
                           ^~~~~~
   drivers/w1/slaves/w1_ds2431.c:240:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&tmp[addr & W1_F2D_SCRATCH_MASK], buf, copy);
                           ^~~~~~
   Suppressed 14 warnings (14 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   15 warnings generated.
   drivers/w1/slaves/w1_ds2805.c:239:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&tmp[addr & W1_F0D_SCRATCH_MASK], buf, copy);
                           ^~~~~~
   drivers/w1/slaves/w1_ds2805.c:239:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&tmp[addr & W1_F0D_SCRATCH_MASK], buf, copy);
                           ^~~~~~
   Suppressed 14 warnings (14 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   14 warnings generated.
   Suppressed 14 warnings (14 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   17 warnings generated.
   drivers/w1/slaves/w1_ds28e04.c:137:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(buf, &data->memory[off], count);
                   ^~~~~~
   drivers/w1/slaves/w1_ds28e04.c:137:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(buf, &data->memory[off], count);
                   ^~~~~~
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   39 warnings generated.
   drivers/comedi/drivers/comedi_bond.c:175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&devs_opened, 0, sizeof(devs_opened));
--
   50 warnings generated.
   Suppressed 50 warnings (50 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   87 warnings generated.
   net/nfc/nci/core.c:231:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(cmd.param.val, param->val, param->len);
           ^~~~~~
   net/nfc/nci/core.c:231:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(cmd.param.val, param->val, param->len);
           ^~~~~~
   net/nfc/nci/core.c:719:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(cmd->params, params, params_len);
                   ^~~~~~
   net/nfc/nci/core.c:719:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(cmd->params, params, params_len);
                   ^~~~~~
   net/nfc/nci/core.c:721:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&ndev->cur_params,
                           ^~~~~~
   net/nfc/nci/core.c:721:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&ndev->cur_params,
                           ^~~~~~
   net/nfc/nci/core.c:1219:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(name, sizeof(name), "%s_nci_cmd_wq", dev_name(dev));
           ^~~~~~~~
   net/nfc/nci/core.c:1219:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(name, sizeof(name), "%s_nci_cmd_wq", dev_name(dev));
           ^~~~~~~~
   net/nfc/nci/core.c:1227:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(name, sizeof(name), "%s_nci_rx_wq", dev_name(dev));
           ^~~~~~~~
   net/nfc/nci/core.c:1227:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(name, sizeof(name), "%s_nci_rx_wq", dev_name(dev));
           ^~~~~~~~
   net/nfc/nci/core.c:1235:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(name, sizeof(name), "%s_nci_tx_wq", dev_name(dev));
           ^~~~~~~~
   net/nfc/nci/core.c:1235:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(name, sizeof(name), "%s_nci_tx_wq", dev_name(dev));
           ^~~~~~~~
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   126 warnings generated.
   drivers/net/ethernet/sun/niu.c:1704:2: warning: Value stored to 'bmcr' is never read [clang-analyzer-deadcode.DeadStores]
           bmcr = mii_read(np, np->phy_addr, MII_BMCR);
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:1704:2: note: Value stored to 'bmcr' is never read
           bmcr = mii_read(np, np->phy_addr, MII_BMCR);
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2215:3: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
                   niu_link_status_common(np, link_up);
                   ^                          ~~~~~~~
   drivers/net/ethernet/sun/niu.c:2211:11: note: 'link_up' declared without an initial value
           int err, link_up;
                    ^~~~~~~
   drivers/net/ethernet/sun/niu.c:2213:8: note: Calling 'niu_link_status'
           err = niu_link_status(np, &link_up);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2201:6: note: Assuming field 'link_status' is null
           if (ops->link_status)
               ^~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2201:2: note: Taking false branch
           if (ops->link_status)
           ^
   drivers/net/ethernet/sun/niu.c:2204:2: note: Returning without writing to '*link_up_p'
           return err;
           ^
   drivers/net/ethernet/sun/niu.c:2204:2: note: Returning zero (loaded from 'err'), which participates in a condition later
           return err;
           ^~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2213:8: note: Returning from 'niu_link_status'
           err = niu_link_status(np, &link_up);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:2214:7: note: 'err' is 0
           if (!err)
                ^~~
   drivers/net/ethernet/sun/niu.c:2214:2: note: Taking true branch
           if (!err)
           ^
   drivers/net/ethernet/sun/niu.c:2215:3: note: 2nd function call argument is an uninitialized value
                   niu_link_status_common(np, link_up);
                   ^                          ~~~~~~~
   drivers/net/ethernet/sun/niu.c:3149:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ent, 0, sizeof(ent));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:3149:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ent, 0, sizeof(ent));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:4636:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
           val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:4636:2: note: Value stored to 'val' is never read
           val |= (imask << TXC_INT_MASK_VAL_SHIFT(np->port));
           ^      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/sun/niu.c:5003:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:5003:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
>> drivers/net/ethernet/sun/niu.c:6008:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6008:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(np->irq_name[0], "%s:MAC", np->dev->name);
           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6011:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6011:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(np->irq_name[1], "%s:MIF", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6012:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6012:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(np->irq_name[2], "%s:SYSERR", np->dev->name);
                   ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6018:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(np->irq_name[i+j], "%s-rx-%d",
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6018:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(np->irq_name[i+j], "%s-rx-%d",
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6021:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6021:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(np->irq_name[i+j], "%s-tx-%d", np->dev->name,
                           ^~~~~~~
   drivers/net/ethernet/sun/niu.c:6032:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
           err = 0;
           ^     ~
   drivers/net/ethernet/sun/niu.c:6032:2: note: Value stored to 'err' is never read
           err = 0;
           ^     ~
   drivers/net/ethernet/sun/niu.c:6557:9: warning: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl' [clang-analyzer-deadcode.DeadStores]
           ipv6 = ihl = 0;
                  ^     ~
   drivers/net/ethernet/sun/niu.c:6557:9: note: Although the value stored to 'ihl' is used in the enclosing expression, the value is never actually read from 'ihl'
           ipv6 = ihl = 0;
                  ^     ~
   drivers/net/ethernet/sun/niu.c:6785:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
           ^~~~~~~~
   drivers/net/ethernet/sun/niu.c:6785:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(info->fw_version, sizeof(info->fw_version), "%d.%d",
           ^~~~~~~~
   drivers/net/ethernet/sun/niu.c:6800:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(cmd, 0, sizeof(*cmd));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:6800:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(cmd, 0, sizeof(*cmd));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:6882:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, ((char *)&val) + b_offset, b_count);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6882:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, ((char *)&val) + b_offset, b_count);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6889:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, &val, 4);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6889:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, &val, 4);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6896:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, &val, len);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:6896:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, &val, len);
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7501:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:7501:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tp, 0, sizeof(*tp));
           ^~~~~~
   drivers/net/ethernet/sun/niu.c:7739:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_xmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7739:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_xmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7743:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_bmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7743:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_bmac_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7748:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_rxchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7748:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_rxchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7753:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, niu_txchan_stat_keys,
                   ^~~~~~
   drivers/net/ethernet/sun/niu.c:7753:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, niu_txchan_stat_keys,
--
                           ^~~~~~
   drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:372:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
                           err = 0;
                           ^     ~
   drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:372:4: note: Value stored to 'err' is never read
                           err = 0;
                           ^     ~
   drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(val_buf, buf_rx->data, val_len);
           ^~~~~~
   drivers/net/can/spi/mcp251xfd/mcp251xfd-regmap.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(val_buf, buf_rx->data, val_len);
           ^~~~~~
   Suppressed 83 warnings (83 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   32 warnings generated.
   drivers/hid/hid-magicmouse.c:858:3: warning: Value stored to 'report' is never read [clang-analyzer-deadcode.DeadStores]
                   report = hid_register_report(hdev, HID_INPUT_REPORT,
                   ^        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/hid/hid-magicmouse.c:858:3: note: Value stored to 'report' is never read
                   report = hid_register_report(hdev, HID_INPUT_REPORT,
                   ^        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   32 warnings generated.
   drivers/hid/hid-microsoft.c:288:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(r, 0, sizeof(*r));
           ^~~~~~
   drivers/hid/hid-microsoft.c:288:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(r, 0, sizeof(*r));
           ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   drivers/hid/hid-multitouch.c:399:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", td->mtclass.quirks);
                  ^~~~~~~
   drivers/hid/hid-multitouch.c:399:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", td->mtclass.quirks);
                  ^~~~~~~
   drivers/hid/hid-multitouch.c:1620:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(name, "%s %s", hdev->name, suffix);
                           ^~~~~~~
   drivers/hid/hid-multitouch.c:1620:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(name, "%s %s", hdev->name, suffix);
                           ^~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: note: Value stored to 'val' is never read
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   95 warnings generated.
   drivers/net/ethernet/freescale/gianfar.c:1684:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1684:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
>> drivers/net/ethernet/freescale/gianfar.c:3325:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3325:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   Suppressed 86 warnings (86 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   drivers/parport/share.c:459:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
           ^~~~~~
   drivers/parport/share.c:459:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
           ^~~~~~
   drivers/parport/share.c:490:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(name, "parport%d", tmp->portnum = tmp->number);
           ^~~~~~~
   drivers/parport/share.c:490:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(name, "parport%d", tmp->portnum = tmp->number);
           ^~~~~~~
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   36 warnings generated.
   Suppressed 36 warnings (36 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   32 warnings generated.
   drivers/parport/ieee1284_ops.c:599:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset (buf, byte, rle_count);
                           ^~~~~~
   drivers/parport/ieee1284_ops.c:599:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset (buf, byte, rle_count);
                           ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   114 warnings generated.
   drivers/net/wireguard/socket.c:237:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(endpoint, 0, sizeof(*endpoint));
           ^~~~~~
   drivers/net/wireguard/socket.c:237:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(endpoint, 0, sizeof(*endpoint));
           ^~~~~~
   drivers/net/wireguard/socket.c:310:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&peer->endpoint.src6, 0, sizeof(peer->endpoint.src6));
           ^~~~~~
   drivers/net/wireguard/socket.c:310:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&peer->endpoint.src6, 0, sizeof(peer->endpoint.src6));
           ^~~~~~
   Suppressed 112 warnings (112 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   94 warnings generated.
   Suppressed 94 warnings (94 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   96 warnings generated.
   drivers/net/wireguard/allowedips.c:31:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(node->bits, src, bits / 8U);
           ^~~~~~
   drivers/net/wireguard/allowedips.c:31:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(node->bits, src, bits / 8U);
           ^~~~~~
   drivers/net/wireguard/allowedips.c:344:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ip + cidr_bytes, 0, node->bitlen / 8U - cidr_bytes);
           ^~~~~~
   drivers/net/wireguard/allowedips.c:344:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ip + cidr_bytes, 0, node->bitlen / 8U - cidr_bytes);
           ^~~~~~
   Suppressed 94 warnings (94 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   99 warnings generated.
   drivers/net/wireguard/ratelimiter.c:103:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&ip, &ipv6_hdr(skb)->saddr, sizeof(ip));
                   ^~~~~~
   drivers/net/wireguard/ratelimiter.c:103:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&ip, &ipv6_hdr(skb)->saddr, sizeof(ip));
                   ^~~~~~
   include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << fls_long(n - 1);
                      ^
   drivers/net/wireguard/ratelimiter.c:161:6: note: Assuming the condition is false
           if (++init_refcnt != 1)
--
                ^
   drivers/atm/iphase.c:1876:13: note: Assuming field 'traffic_class' is equal to ATM_CBR
           } else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:1876:9: note: Taking true branch
           } else if (vcc->qos.txtp.traffic_class == ATM_CBR) {
                  ^
   drivers/atm/iphase.c:1877:17: note: Taking false branch
                   if (iadev->phy_type & FE_25MBIT_PHY) {
                   ^
   drivers/atm/iphase.c:1881:21: note: Assuming field 'max_pcr' is <= field 'LineRate'
                   if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:1881:17: note: Taking false branch
                   if (vcc->qos.txtp.max_pcr > iadev->LineRate) {
                   ^
   drivers/atm/iphase.c:1887:28: note: Calling 'ia_cbr_setup'
                   if ((ret = ia_cbr_setup (iadev, vcc)) < 0) {     
                              ^~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:474:8: note: Assuming field 'max_pcr' is > 0
      if (vcc->qos.txtp.max_pcr <= 0) {
          ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:474:4: note: Taking false branch
      if (vcc->qos.txtp.max_pcr <= 0) {
      ^
   drivers/atm/iphase.c:479:4: note: Value assigned to 'entries'
      entries = rate / dev->Granularity;
      ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:480:4: note: Assuming the condition is false
      IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
      ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                           ^~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:480:4: note: Taking false branch
      IF_CBR(printk("CBR: CBR entries=0x%x for rate=0x%x & Gran=0x%x\n",
      ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:482:8: note: Assuming 'entries' is < 1
      if (entries < 1)
          ^~~~~~~~~~~
   drivers/atm/iphase.c:482:4: note: Taking true branch
      if (entries < 1)
      ^
   drivers/atm/iphase.c:483:7: note: Taking false branch
         IF_CBR(printk("CBR: Bandwidth smaller than granularity of CBR table\n");) 
         ^
   drivers/atm/iphase.h:94:19: note: expanded from macro 'IF_CBR'
   #define IF_CBR(A) IF_IADBG( IF_IADBG_CBR ) { A }
                     ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:486:8: note: Assuming the condition is false
      if (3*(rate - rateLow) > (rateHigh - rate))
          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:486:4: note: Taking false branch
      if (3*(rate - rateLow) > (rateHigh - rate))
      ^
   drivers/atm/iphase.c:488:8: note: 'entries' is <= field 'CbrRemEntries'
      if (entries > dev->CbrRemEntries) {
          ^~~~~~~
   drivers/atm/iphase.c:488:4: note: Taking false branch
      if (entries > dev->CbrRemEntries) {
      ^
   drivers/atm/iphase.c:502:33: note: Division by zero
      spacing = dev->CbrTotEntries / entries;
                ~~~~~~~~~~~~~~~~~~~^~~~~~~~~
   drivers/atm/iphase.c:534:7: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
         memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
         ^~~~~~
   drivers/atm/iphase.c:534:7: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
         memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
         ^~~~~~
   drivers/atm/iphase.c:545:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC)); 
             ^~~~~~
   drivers/atm/iphase.c:545:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC)); 
             ^~~~~~
   drivers/atm/iphase.c:559:11: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
             ^~~~~~
   drivers/atm/iphase.c:559:11: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
             memcpy((caddr_t)&cbrVC,(caddr_t)TstSchedTbl,sizeof(cbrVC));
             ^~~~~~
   drivers/atm/iphase.c:562:8: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
          memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
          ^~~~~~
   drivers/atm/iphase.c:562:8: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
          memcpy((caddr_t)TstSchedTbl, (caddr_t)&vcIndex, sizeof(*TstSchedTbl));
          ^~~~~~
>> drivers/atm/iphase.c:985:17: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           pBuf += sprintf( pBuf, "%s", prefix );
                   ^~~~~~~
   drivers/atm/iphase.c:985:17: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           pBuf += sprintf( pBuf, "%s", prefix );
                   ^~~~~~~
   drivers/atm/iphase.c:988:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   pBuf += sprintf( pBuf, " " );
                           ^~~~~~~
   drivers/atm/iphase.c:988:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   pBuf += sprintf( pBuf, " " );
                           ^~~~~~~
   drivers/atm/iphase.c:989:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
               pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
                       ^~~~~~~
   drivers/atm/iphase.c:989:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
               pBuf += sprintf( pBuf, "%02X ", cp[count + col] );
                       ^~~~~~~
   drivers/atm/iphase.c:993:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf( pBuf, " " );
                   ^~~~~~~
   drivers/atm/iphase.c:993:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf( pBuf, " " );
                   ^~~~~~~
   drivers/atm/iphase.c:994:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
               pBuf += sprintf( pBuf, "   " );
                       ^~~~~~~
   drivers/atm/iphase.c:994:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
               pBuf += sprintf( pBuf, "   " );
                       ^~~~~~~
   drivers/atm/iphase.c:996:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           pBuf += sprintf( pBuf, "  " );
                   ^~~~~~~
   drivers/atm/iphase.c:996:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           pBuf += sprintf( pBuf, "  " );
                   ^~~~~~~
   drivers/atm/iphase.c:1001:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           pBuf += sprintf(pBuf, "%c", c);
                                   ^~~~~~~
   drivers/atm/iphase.c:1001:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           pBuf += sprintf(pBuf, "%c", c);
                                   ^~~~~~~
   drivers/atm/iphase.c:1003:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           pBuf += sprintf(pBuf, ".");
                                   ^~~~~~~
   drivers/atm/iphase.c:1003:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           pBuf += sprintf(pBuf, ".");
                                   ^~~~~~~
   drivers/atm/iphase.c:1396:30: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
           *vc_table = vcc->vci << 6;
                                ^
   drivers/atm/iphase.c:2696:6: note: Assuming the condition is false
           if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))  
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2696:2: note: Taking false branch
           if (!test_bit(ATM_VF_PARTIAL,&vcc->flags))  
           ^
   drivers/atm/iphase.c:2701:6: note: Assuming the condition is false
           if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)  
               ^~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2701:33: note: Left side of '&&' is false
           if (vcc->vci != ATM_VPI_UNSPEC && vcc->vpi != ATM_VCI_UNSPEC)  
                                          ^
   drivers/atm/iphase.c:2706:6: note: Assuming field 'aal' is equal to ATM_AAL5
           if (vcc->qos.aal != ATM_AAL5)  
               ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2706:2: note: Taking false branch
           if (vcc->qos.aal != ATM_AAL5)  
           ^
   drivers/atm/iphase.c:2708:2: note: Assuming the condition is false
           IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n", 
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
                       ^~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/atm/iphase.h:70:25: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                           ^~~~~~~~~~~~~~~~~
   drivers/atm/iphase.c:2708:2: note: Taking false branch
           IF_EVENT(printk(DEV_LABEL "(itf %d): open %d.%d\n", 
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
                       ^
   drivers/atm/iphase.h:70:21: note: expanded from macro 'IF_IADBG'
   #define IF_IADBG(f) if (IADebugFlag & (f))
                       ^
   drivers/atm/iphase.c:2713:6: note: Assuming 'ia_vcc' is non-null
           if (!ia_vcc) return -ENOMEM;  
               ^~~~~~~
   drivers/atm/iphase.c:2713:2: note: Taking false branch
           if (!ia_vcc) return -ENOMEM;  
           ^
   drivers/atm/iphase.c:2716:15: note: Calling 'open_rx'
           if ((error = open_rx(vcc)))  
                        ^~~~~~~~~~~~
   drivers/atm/iphase.c:1380:2: note: Assuming the condition is false
           IF_EVENT(printk("iadev: open_rx %d.%d\n", vcc->vpi, vcc->vci);)
           ^
   drivers/atm/iphase.h:97:21: note: expanded from macro 'IF_EVENT'
   #define IF_EVENT(A) IF_IADBG( IF_IADBG_EVENT) { A }
--
                             ^~~~~~~~~~~~~~
   net/sched/sch_ets.c:662:2: note: Loop condition is false. Execution continues on line 668
           for (i = nstrict; i < q->nstrict; i++) {
           ^
   net/sched/sch_ets.c:668:22: note: Assuming 'i' is >= 'oldbands'
           for (i = q->nbands; i < oldbands; i++) {
                               ^~~~~~~~~~~~
   net/sched/sch_ets.c:668:2: note: Loop condition is false. Execution continues on line 673
           for (i = q->nbands; i < oldbands; i++) {
           ^
   net/sched/sch_ets.c:676:14: note: 'i' is < field 'nbands'
           for (i = 0; i < q->nbands; i++)
                       ^
   net/sched/sch_ets.c:676:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < q->nbands; i++)
           ^
   net/sched/sch_ets.c:676:14: note: Assuming 'i' is < field 'nbands'
           for (i = 0; i < q->nbands; i++)
                       ^~~~~~~~~~~~~
   net/sched/sch_ets.c:676:2: note: Loop condition is true.  Entering loop body
           for (i = 0; i < q->nbands; i++)
           ^
   net/sched/sch_ets.c:676:14: note: Assuming 'i' is >= field 'nbands'
           for (i = 0; i < q->nbands; i++)
                       ^~~~~~~~~~~~~
   net/sched/sch_ets.c:676:2: note: Loop condition is false. Execution continues on line 679
           for (i = 0; i < q->nbands; i++)
           ^
   net/sched/sch_ets.c:679:7: note: The value of 'oldbands' is assigned to 'i'
           for (i = oldbands; i < q->nbands; i++) {
                ^~~~~~~~~~~~
   net/sched/sch_ets.c:679:21: note: Assuming 'i' is < field 'nbands'
           for (i = oldbands; i < q->nbands; i++) {
                              ^~~~~~~~~~~~~
   net/sched/sch_ets.c:679:2: note: Loop condition is true.  Entering loop body
           for (i = oldbands; i < q->nbands; i++) {
           ^
   net/sched/sch_ets.c:680:23: note: Assigned value is garbage or undefined
                   q->classes[i].qdisc = queues[i];
                                       ^ ~~~~~~~~~
   net/sched/sch_ets.c:694:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
                   ^~~~~~
   net/sched/sch_ets.c:694:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&q->classes[i].qstats, 0, sizeof(q->classes[i].qstats));
                   ^~~~~~
   Suppressed 80 warnings (80 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   sound/core/seq/seq_ports.c:136:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:136:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:155:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:155:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(new_port->name, "port-%d", num);
           ^~~~~~~
   sound/core/seq/seq_ports.c:670:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:670:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:702:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   sound/core/seq/seq_ports.c:702:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&portinfo, 0, sizeof(portinfo));
           ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   44 warnings generated.
   sound/spi/at73c213.c:714:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->mixername, chip->pcm->name);
           ^~~~~~
   sound/spi/at73c213.c:714:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(card->mixername, chip->pcm->name);
           ^~~~~~
   sound/spi/at73c213.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&chip->reg_image, &snd_at73c213_original_image,
           ^~~~~~
   sound/spi/at73c213.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&chip->reg_image, &snd_at73c213_original_image,
           ^~~~~~
   sound/spi/at73c213.c:962:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
           ^~~~~~~~
   sound/spi/at73c213.c:962:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(id, sizeof id, "at73c213_%d", board->ssc_id);
           ^~~~~~~~
   sound/spi/at73c213.c:985:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->shortname, board->shortname);
           ^~~~~~
   sound/spi/at73c213.c:985:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(card->shortname, board->shortname);
           ^~~~~~
>> sound/spi/at73c213.c:986:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
           ^~~~~~~
   sound/spi/at73c213.c:986:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(card->longname, "%s on irq %d", card->shortname, chip->irq);
           ^~~~~~~
   Suppressed 39 warnings (39 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   105 warnings generated.
   drivers/message/fusion/mptsas.c:165:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
           ^~~~~~
   drivers/message/fusion/mptsas.c:165:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
           ^~~~~~
   drivers/message/fusion/mptsas.c:208:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
           ^~~~~~
   drivers/message/fusion/mptsas.c:208:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&sas_address, &pg0->SASAddress, sizeof(__le64));
           ^~~~~~
   drivers/message/fusion/mptsas.c:498:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
                   ^~~~~~
   drivers/message/fusion/mptsas.c:498:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
                   ^~~~~~
   drivers/message/fusion/mptsas.c:661:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
           ^~~~~~
   drivers/message/fusion/mptsas.c:661:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
           ^~~~~~
   drivers/message/fusion/mptsas.c:690:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptsas.c:690:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&cfg, 0 , sizeof(CONFIGPARMS));
           ^~~~~~
   drivers/message/fusion/mptsas.c:691:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptsas.c:691:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0 , sizeof(ConfigPageHeader_t));
           ^~~~~~
   drivers/message/fusion/mptsas.c:796:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
           ^~~~~~
   drivers/message/fusion/mptsas.c:796:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&enclosure_info, 0, sizeof(struct mptsas_enclosure));
           ^~~~~~
   drivers/message/fusion/mptsas.c:884:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
                   ^~~~~~
   drivers/message/fusion/mptsas.c:884:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&phy_info->attached, 0, sizeof(struct mptsas_devinfo));
                   ^~~~~~
   drivers/message/fusion/mptsas.c:917:31: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
                                   port_details->phy_bitmask |=
                                                             ^
   drivers/message/fusion/mptsas.c:5169:6: note: Assuming 'r' is 0
           if (r)
               ^
   drivers/message/fusion/mptsas.c:5169:2: note: Taking false branch
           if (r)
           ^
   drivers/message/fusion/mptsas.c:5182:6: note: Assuming field 'last_state' is equal to MPI_IOC_STATE_OPERATIONAL
           if (ioc->last_state != MPI_IOC_STATE_OPERATIONAL) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptsas.c:5182:2: note: Taking false branch
           if (ioc->last_state != MPI_IOC_STATE_OPERATIONAL) {
           ^
   drivers/message/fusion/mptsas.c:5190:6: note: Assuming field 'active' is not equal to 0
           if (!ioc->active) {
               ^~~~~~~~~~~~
   drivers/message/fusion/mptsas.c:5190:2: note: Taking false branch
           if (!ioc->active) {
           ^
   drivers/message/fusion/mptsas.c:5200:15: note: Assuming 'ii' is < field 'NumberOfPorts'
           for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptsas.c:5200:2: note: Loop condition is true.  Entering loop body
           for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
           ^
   drivers/message/fusion/mptsas.c:5201:7: note: Assuming the condition is true
                   if (ioc->pfacts[ii].ProtocolFlags &
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptsas.c:5201:3: note: Taking true branch
                   if (ioc->pfacts[ii].ProtocolFlags &
                   ^
   drivers/message/fusion/mptsas.c:5200:15: note: Assuming 'ii' is >= field 'NumberOfPorts'
           for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/message/fusion/mptsas.c:5200:2: note: Loop condition is false. Execution continues on line 5206
           for (ii = 0; ii < ioc->facts.NumberOfPorts; ii++) {
           ^
   drivers/message/fusion/mptsas.c:5206:7: note: 'ioc_cap' is 1
           if (!ioc_cap) {
                ^~~~~~~
   drivers/message/fusion/mptsas.c:5206:2: note: Taking false branch
           if (!ioc_cap) {
--
   88 warnings generated.
   Suppressed 88 warnings (88 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   129 warnings generated.
   drivers/net/ethernet/intel/igc/igc_main.c:652:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ring->rx_buffer_info, 0,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:652:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ring->rx_buffer_info, 0,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:878:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:878:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:914:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:914:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:929:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:929:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:954:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:954:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(hw->mac.addr, addr->sa_data, netdev->addr_len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:992:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:992:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(mta_list + (i++ * ETH_ALEN), ha->addr, ETH_ALEN);
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:1776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:1776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(__skb_put(skb, headlen + metasize), xdp->data_meta,
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2461:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2461:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(__skb_put(skb, totalsize), xdp->data_meta, totalsize);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2899:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2899:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2928:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2928:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2964:21: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:2964:21: note: Value stored to 'dev' during its initialization is never read
           struct net_device *dev = adapter->netdev;
                              ^~~   ~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:3238:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&flex->data[offset], src, len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:3238:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&flex->data[offset], src, len);
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4011:3: warning: Value stored to 'current_itr' is never read [clang-analyzer-deadcode.DeadStores]
                   current_itr = 0;
                   ^             ~
   drivers/net/ethernet/intel/igc/igc_main.c:4011:3: note: Value stored to 'current_itr' is never read
                   current_itr = 0;
                   ^             ~
   drivers/net/ethernet/intel/igc/igc_main.c:4168:6: warning: Value stored to 'new_val' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           int new_val = q_vector->itr_val;
               ^~~~~~~   ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4168:6: note: Value stored to 'new_val' during its initialization is never read
           int new_val = q_vector->itr_val;
               ^~~~~~~   ~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4350:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4350:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(q_vector, 0, struct_size(q_vector, ring, ring_count));
                   ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4928:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(stats, &adapter->stats64, sizeof(*stats));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:4928:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(stats, &adapter->stats64, sizeof(*stats));
           ^~~~~~
>> drivers/net/ethernet/intel/igc/igc_main.c:5173:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5173:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-TxRx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5176:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-tx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5176:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-tx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5179:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-rx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5179:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-rx-%u", netdev->name,
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5182:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(q_vector->name, "%s-unused", netdev->name);
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:5182:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(q_vector->name, "%s-unused", netdev->name);
                           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6331:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6331:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hw->mac.ops, ei->mac_ops, sizeof(hw->mac.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6332:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6332:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&hw->phy.ops, ei->phy_ops, sizeof(hw->phy.ops));
           ^~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6448:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(netdev->name, "eth%d", IFNAMSIZ);
           ^~~~~~~
   drivers/net/ethernet/intel/igc/igc_main.c:6448:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
           strncpy(netdev->name, "eth%d", IFNAMSIZ);
           ^~~~~~~
   Suppressed 106 warnings (106 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   64 warnings generated.
   drivers/ata/libata-eh.c:678:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&link->eh_context, 0, sizeof(link->eh_context));
                           ^~~~~~
   drivers/ata/libata-eh.c:678:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(&link->eh_context, 0, sizeof(link->eh_context));
                           ^~~~~~
   drivers/ata/libata-eh.c:680:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&link->eh_info, 0, sizeof(link->eh_info));
                           ^~~~~~
   drivers/ata/libata-eh.c:680:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(&link->eh_info, 0, sizeof(link->eh_info));
                           ^~~~~~
   drivers/ata/libata-eh.c:730:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&link->eh_info, 0, sizeof(link->eh_info));
                           ^~~~~~
   drivers/ata/libata-eh.c:730:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(&link->eh_info, 0, sizeof(link->eh_info));
                           ^~~~~~
   drivers/ata/libata-eh.c:1464:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(sense_buf, 0, SCSI_SENSE_BUFFERSIZE);
           ^~~~~~
   drivers/ata/libata-eh.c:1464:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(sense_buf, 0, SCSI_SENSE_BUFFERSIZE);
           ^~~~~~
   drivers/ata/libata-eh.c:1743:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&arg, 0, sizeof(arg));
           ^~~~~~
   drivers/ata/libata-eh.c:1743:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&arg, 0, sizeof(arg));
           ^~~~~~
   drivers/ata/libata-eh.c:1762:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&arg, 0, sizeof(arg));
           ^~~~~~
   drivers/ata/libata-eh.c:1762:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&arg, 0, sizeof(arg));
           ^~~~~~
   drivers/ata/libata-eh.c:2247:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(tries_buf, sizeof(tries_buf), " t%d",
                   ^~~~~~~~
   drivers/ata/libata-eh.c:2247:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(tries_buf, sizeof(tries_buf), " t%d",
                   ^~~~~~~~
   drivers/ata/libata-eh.c:2335:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(data_buf, sizeof(data_buf), " %s %u %s",
                           ^~~~~~~~
   drivers/ata/libata-eh.c:2335:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(data_buf, sizeof(data_buf), " %s %u %s",
                           ^~~~~~~~
   drivers/ata/libata-eh.c:2717:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&link->eh_info, 0, sizeof(link->eh_info));
           ^~~~~~
   drivers/ata/libata-eh.c:2717:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&link->eh_info, 0, sizeof(link->eh_info));
           ^~~~~~
   drivers/ata/libata-eh.c:2719:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&slave->eh_info, 0, sizeof(link->eh_info));
--
           memset(&priv->rx_priority_flowstats, 0,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2053:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&priv->tx_priority_flowstats, 0,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2053:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&priv->tx_priority_flowstats, 0,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2055:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&priv->pf_stats, 0, sizeof(priv->pf_stats));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2055:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&priv->pf_stats, 0, sizeof(priv->pf_stats));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2222:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&dst->hwtstamp_config, &prof->hwtstamp_config,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2222:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&dst->hwtstamp_config, &prof->hwtstamp_config,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2268:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dst->rx_ring, src->rx_ring,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2268:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dst->rx_ring, src->rx_ring,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dst->rx_cq, src->rx_cq,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dst->rx_cq, src->rx_cq,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2272:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&dst->hwtstamp_config, &src->hwtstamp_config,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2272:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&dst->hwtstamp_config, &src->hwtstamp_config,
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2281:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dst->prof, src->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2281:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dst->prof, src->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2776:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:2776:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3099:3: warning: Value stored to 'last_i' is never read [clang-analyzer-deadcode.DeadStores]
                   last_i += NUM_FLOW_STATS_TX;
                   ^
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3099:3: note: Value stored to 'last_i' is never read
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3155:2: warning: Value stored to 'last_i' is never read [clang-analyzer-deadcode.DeadStores]
           last_i += NUM_PHY_STATS;
           ^
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3155:2: note: Value stored to 'last_i' is never read
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3182:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(priv, 0, sizeof(struct mlx4_en_priv));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3182:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(priv, 0, sizeof(struct mlx4_en_priv));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3287:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(priv->current_mac, dev->dev_addr, sizeof(priv->current_mac));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3287:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(priv->current_mac, dev->dev_addr, sizeof(priv->current_mac));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3521:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3521:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&new_prof, priv->prof, sizeof(struct mlx4_en_port_profile));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3522:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&new_prof.hwtstamp_config, &ts_config, sizeof(ts_config));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/en_netdev.c:3522:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&new_prof.hwtstamp_config, &ts_config, sizeof(ts_config));
           ^~~~~~
   Suppressed 120 warnings (120 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   76 warnings generated.
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   96 warnings generated.
   drivers/net/ethernet/mellanox/mlx4/main.c:562:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&hca_param, 0, sizeof(hca_param));
                   ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:562:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&hca_param, 0, sizeof(hca_param));
                   ^~~~~~
>> drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(type, "%s",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1166:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(type, "%s",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "auto (%s)\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1170:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "auto (%s)\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "%s\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1172:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "%s\n", type);
                   ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(buf, "%d\n",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:1319:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(buf, "%d\n",
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:2475:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(dev->board_id, adapter.board_id, sizeof(dev->board_id));
           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->dev_name, "mlx4_port%d", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3060:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->dev_name, "mlx4_port%d", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3079:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(info->dev_mtu_name, "mlx4_port%d_mtu", port);
           ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
                           err = -ENOMEM;
                           ^     ~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3258:4: note: Value stored to 'err' is never read
                           err = -ENOMEM;
                           ^     ~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(dev_cap, 0, sizeof(*dev_cap));
                           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3482:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(dev_cap, 0, sizeof(*dev_cap));
                           ^~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3517:30: warning: Access to field 'flags2' results in a dereference of a null pointer (loaded from variable 'dev_cap') [clang-analyzer-core.NullDereference]
           if (mlx4_is_master(dev) && (dev_cap->flags2 & MLX4_DEV_CAP_FLAG2_SYS_EQS)) {
                                       ^~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3341:2: note: 'dev_cap' initialized to a null pointer value
           struct mlx4_dev_cap *dev_cap = NULL;
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3347:2: note: Loop condition is false.  Exiting loop
           spin_lock_init(&priv->ctx_lock);
           ^
   include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
   # define spin_lock_init(lock)                                   \
                                                                   ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3349:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->port_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3350:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->bond_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3353:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->pgdir_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3354:2: note: Loop condition is false.  Exiting loop
           spin_lock_init(&priv->cmd.context_lock);
           ^
   include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
   # define spin_lock_init(lock)                                   \
                                                                   ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3357:2: note: Loop condition is false.  Exiting loop
           mutex_init(&priv->bf_mutex);
           ^
   include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
   #define mutex_init(mutex)                                               \
                                                                           ^
   drivers/net/ethernet/mellanox/mlx4/main.c:3363:6: note: Assuming the condition is true
           if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/main.c:3363:2: note: Taking true branch
           if (pci_dev_data & MLX4_PCI_DEV_IS_VF) {
--
           ^
   include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
           if (!(x & 0xffff0000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
           if (!(x & 0xffff0000u)) {
           ^
   include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
           if (!(x & 0xff000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
           if (!(x & 0xff000000u)) {
           ^
   include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
           if (!(x & 0xf0000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
           if (!(x & 0xf0000000u)) {
           ^
   include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
           if (!(x & 0xc0000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
           if (!(x & 0xc0000000u)) {
           ^
   include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
           if (!(x & 0x80000000u)) {
               ^~~~~~~~~~~~~~~~~~
   include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
           if (!(x & 0x80000000u)) {
           ^
   include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
           return r;
           ^~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Returning from 'fls'
                                       fls(dev->caps.reserved_mtts - 1));
                                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:964:9: note: Passing the value 32 via 3rd parameter 'order'
                                       fls(dev->caps.reserved_mtts - 1));
                                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:963:3: note: Calling 'mlx4_free_mtt_range'
                   mlx4_free_mtt_range(dev, priv->reserved_mtts,
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:236:6: note: Assuming the condition is false
           if (mlx4_is_mfunc(dev)) {
               ^~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:236:2: note: Taking false branch
           if (mlx4_is_mfunc(dev)) {
           ^
   drivers/net/ethernet/mellanox/mlx4/mr.c:248:37: note: Passing the value 32 via 3rd parameter 'order'
           __mlx4_free_mtt_range(dev, offset, order);
                                              ^~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:248:2: note: Calling '__mlx4_free_mtt_range'
           __mlx4_free_mtt_range(dev, offset, order);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: Assuming '__UNIQUE_ID___x352' is <= '__UNIQUE_ID___y353'
           seg_order = max_t(int, order - log_mtts_per_seg, 0);
                       ^
   include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
   #define max_t(type, x, y)       __careful_cmp((type)(x), (type)(y), >)
                                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
                   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
   #define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
                            ^~~~~~~~~~
   drivers/net/ethernet/mellanox/mlx4/mr.c:223:14: note: '?' condition is false
           seg_order = max_t(int, order - log_mtts_per_seg, 0);
                       ^
   include/linux/minmax.h:112:27: note: expanded from macro 'max_t'
   #define max_t(type, x, y)       __careful_cmp((type)(x), (type)(y), >)
                                   ^
   include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
                   __cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
                   ^
   include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
                   __cmp(unique_x, unique_y, op); })
                   ^
   include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
   #define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
                            ^
   drivers/net/ethernet/mellanox/mlx4/mr.c:228:21: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
                                offset + (1 << order) - 1);
                                            ^  ~~~~~
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   79 warnings generated.
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
                   ^~~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, bgmac->mii_bus->id,
                   ^~~~~~~~
   Suppressed 78 warnings (78 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   77 warnings generated.
>> drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   Suppressed 76 warnings (76 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   113 warnings generated.
   drivers/net/ethernet/broadcom/bcmsysport.c:381:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:381:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, s->stat_string,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:387:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(buf, sizeof(buf), "txq%d_packets", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:387:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(buf, sizeof(buf), "txq%d_packets", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:388:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:388:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:392:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           snprintf(buf, sizeof(buf), "txq%d_bytes", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:392:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
                           snprintf(buf, sizeof(buf), "txq%d_bytes", i);
                           ^~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:393:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:393:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(data + j * ETH_GSTRING_LEN, buf,
                           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:543:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:543:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(wol->sopass, priv->sopass, sizeof(priv->sopass));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:560:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
                   ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:560:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(priv->sopass, wol->sopass, sizeof(priv->sopass));
                   ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:903:21: warning: Value stored to 'ndev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct net_device *ndev = priv->netdev;
                              ^~~~   ~~~~~~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:903:21: note: Value stored to 'ndev' during its initialization is never read
           struct net_device *ndev = priv->netdev;
                              ^~~~   ~~~~~~~~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(tsb, 0, sizeof(*tsb));
           ^~~~~~
   drivers/net/ethernet/broadcom/bcmsysport.c:1263:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(tsb, 0, sizeof(*tsb));
           ^~~~~~
   Suppressed 104 warnings (100 in non-user code, 4 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   114 warnings generated.
   net/ipv4/fib_trie.c:419:2: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
           struct key_vector *chi = get_child(tn, i);
           ^
   net/ipv4/fib_trie.c:2021:2: note: Loop condition is true.  Entering loop body
           for (;;) {
           ^
   net/ipv4/fib_trie.c:2025:3: note: Taking false branch
                   if (!(cindex--)) {
                   ^
   net/ipv4/fib_trie.c:2044:7: note: Assuming the condition is false
                   n = get_child(pn, cindex);
                       ^
   net/ipv4/fib_trie.c:194:26: note: expanded from macro 'get_child'
   #define get_child(tn, i) rtnl_dereference((tn)->tnode[i])
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
           rcu_dereference_protected(p, lockdep_rtnl_is_held())
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/rcupdate.h:594:2: note: expanded from macro 'rcu_dereference_protected'
           __rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/rcupdate.h:398:19: note: expanded from macro '__rcu_dereference_protected'
           RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
           ~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/rcupdate.h:319:8: note: expanded from macro 'RCU_LOCKDEP_WARN'
                   if ((c) && debug_lockdep_rcu_enabled() && !__warned) {  \
                        ^
   net/ipv4/fib_trie.c:2044:7: note: Left side of '&&' is false
                   n = get_child(pn, cindex);
                       ^
   net/ipv4/fib_trie.c:194:26: note: expanded from macro 'get_child'
   #define get_child(tn, i) rtnl_dereference((tn)->tnode[i])
                            ^
   include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
           rcu_dereference_protected(p, lockdep_rtnl_is_held())
--
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/lockdep.h:310:15: note: expanded from macro 'lockdep_assert'
           do { WARN_ON(debug_locks && !(cond)); } while (0)
                        ^~~~~~~~~~~
   include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
           int __ret_warn_on = !!(condition);                              \
                                  ^~~~~~~~~
   net/batman-adv/tvlv.c:189:2: note: Left side of '&&' is false
           lockdep_assert_held(&bat_priv->tvlv.container_list_lock);
           ^
   include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
           lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
           ^
   include/linux/lockdep.h:310:27: note: expanded from macro 'lockdep_assert'
           do { WARN_ON(debug_locks && !(cond)); } while (0)
                                    ^
   net/batman-adv/tvlv.c:189:2: note: Loop condition is false.  Exiting loop
           lockdep_assert_held(&bat_priv->tvlv.container_list_lock);
           ^
   include/linux/lockdep.h:316:2: note: expanded from macro 'lockdep_assert_held'
           lockdep_assert(lockdep_is_held(l) != LOCK_STATE_NOT_HELD)
           ^
   include/linux/lockdep.h:310:2: note: expanded from macro 'lockdep_assert'
           do { WARN_ON(debug_locks && !(cond)); } while (0)
           ^
   net/batman-adv/tvlv.c:191:6: note: Assuming 'tvlv' is non-null
           if (!tvlv)
               ^~~~~
   net/batman-adv/tvlv.c:191:2: note: Taking false branch
           if (!tvlv)
           ^
   net/batman-adv/tvlv.c:197:2: note: Calling 'batadv_tvlv_container_put'
           batadv_tvlv_container_put(tvlv);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/tvlv.c:112:7: note: 'tvlv' is non-null
           if (!tvlv)
                ^~~~
   net/batman-adv/tvlv.c:112:2: note: Taking false branch
           if (!tvlv)
           ^
   net/batman-adv/tvlv.c:115:2: note: Calling 'kref_put'
           kref_put(&tvlv->refcount, batadv_tvlv_container_release);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/kref.h:64:6: note: Assuming the condition is true
           if (refcount_dec_and_test(&kref->refcount)) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/kref.h:64:2: note: Taking true branch
           if (refcount_dec_and_test(&kref->refcount)) {
           ^
   include/linux/kref.h:65:3: note: Calling 'batadv_tvlv_container_release'
                   release(kref);
                   ^~~~~~~~~~~~~
   net/batman-adv/tvlv.c:102:2: note: Memory is released
           kfree(tvlv);
           ^~~~~~~~~~~
   include/linux/kref.h:65:3: note: Returning; memory was released
                   release(kref);
                   ^~~~~~~~~~~~~
   net/batman-adv/tvlv.c:115:2: note: Returning; memory was released
           kref_put(&tvlv->refcount, batadv_tvlv_container_release);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/tvlv.c:197:2: note: Returning; memory was released via 1st parameter
           batadv_tvlv_container_put(tvlv);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/tvlv.c:198:2: note: Use of memory after it is freed
           batadv_tvlv_container_put(tvlv);
           ^                         ~~~~
   net/batman-adv/tvlv.c:248:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
           ^~~~~~
   net/batman-adv/tvlv.c:248:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
           ^~~~~~
   net/batman-adv/tvlv.c:289:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(new_buff, *packet_buff, min_packet_len);
           ^~~~~~
   net/batman-adv/tvlv.c:289:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(new_buff, *packet_buff, min_packet_len);
           ^~~~~~
   net/batman-adv/tvlv.c:341:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
                   ^~~~~~
   net/batman-adv/tvlv.c:341:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(tvlv_value, tvlv + 1, ntohs(tvlv->tvlv_hdr.len));
                   ^~~~~~
   net/batman-adv/tvlv.c:631:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
           ^~~~~~
   net/batman-adv/tvlv.c:631:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(tvlv_buff, tvlv_value, tvlv_value_len);
           ^~~~~~
   Suppressed 79 warnings (79 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   97 warnings generated.
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ts, 0, sizeof(ts));
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:642:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ts, 0, sizeof(ts));
           ^~~~~~
>> drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-rxtx-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1123:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-rxtx-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-sq-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1128:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-sq-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(nic->irq_name[irq], "%s-rbdr-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1133:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(nic->irq_name[irq], "%s-rbdr-%d",
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1159:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(nic->irq_name[NICVF_INTR_ID_QS_ERR], "%s-qset-err-%d",
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1229:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(nic->irq_name[irq], "%s Mbox", "NICVF");
           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
                           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1523:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(per_cpu_ptr(nic->drv_stats, cpu), 0,
                           ^~~~~~
   include/linux/log2.h:67:13: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
           return 1UL << (fls_long(n) - 1);
                      ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1898:2: note: Taking false branch
           if (pass1_silicon(nic->pdev))
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1901:2: note: Control jumps to 'case XDP_SETUP_PROG:'  at line 1902
           switch (xdp->command) {
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1903:10: note: Calling 'nicvf_xdp_setup'
                   return nicvf_xdp_setup(nic, xdp->prog);
                          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:6: note: Assuming 'prog' is null
           if (prog && dev->mtu > MAX_XDP_MTU) {
               ^~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1844:11: note: Left side of '&&' is false
           if (prog && dev->mtu > MAX_XDP_MTU) {
                    ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:6: note: Assuming the condition is false
           if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1857:2: note: Taking false branch
           if ((nic->rx_queues + nic->tx_queues) > nic->max_queues) {
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:6: note: Assuming 'if_up' is true
           if (if_up)
               ^~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1864:2: note: Taking true branch
           if (if_up)
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Loop condition is false.  Exiting loop
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1884:2: note: expanded from macro 'xchg'
           kcsan_mb(); \
           ^
   include/linux/kcsan-checks.h:264:20: note: expanded from macro 'kcsan_mb'
   #define kcsan_mb()      do { } while (0)
                           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note: Control jumps to 'case 8:'  at line 1867
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
           arch_xchg(__ai_ptr, __VA_ARGS__); \
           ^
   arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
           (__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr)));        \
                                ^
   arch/riscv/include/asm/cmpxchg.h:122:2: note: expanded from macro '__xchg'
           switch (size) {                                                 \
           ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1867:13: note:  Execution continues on line 1867
           old_prog = xchg(&nic->xdp_prog, prog);
                      ^
   include/linux/atomic/atomic-instrumented.h:1886:2: note: expanded from macro 'xchg'
           arch_xchg(__ai_ptr, __VA_ARGS__); \
           ^
   arch/riscv/include/asm/cmpxchg.h:146:23: note: expanded from macro 'arch_xchg'
           (__typeof__(*(ptr))) __xchg((ptr), _x_, sizeof(*(ptr)));        \
                                ^
   arch/riscv/include/asm/cmpxchg.h:136:3: note: expanded from macro '__xchg'
                   break;                                                  \
                   ^
   drivers/net/ethernet/cavium/thunder/nicvf_main.c:1869:6: note: Assuming 'old_prog' is null
           if (old_prog)
--
           ^
   include/asm-generic/bitops/fls64.h:31:2: note: Returning the value 64
           return __fls(x) + 1;
           ^~~~~~~~~~~~~~~~~~~
   include/linux/bitops.h:156:9: note: Returning from 'fls64'
           return fls64(l);
                  ^~~~~~~~
   include/linux/bitops.h:156:2: note: Returning the value 64
           return fls64(l);
           ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:16: note: Returning from 'fls_long'
           return 1UL << fls_long(n - 1);
                         ^~~~~~~~~~~~~~~
   include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long'
           return 1UL << fls_long(n - 1);
                      ^  ~~~~~~~~~~~~~~~
   Suppressed 101 warnings (101 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   114 warnings generated.
   net/ipv4/ah4.c:109:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(daddr, optptr+optlen-4, 4);
                           ^~~~~~
   net/ipv4/ah4.c:109:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(daddr, optptr+optlen-4, 4);
                           ^~~~~~
   net/ipv4/ah4.c:112:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(optptr, 0, optlen);
                           ^~~~~~
   net/ipv4/ah4.c:112:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                           memset(optptr, 0, optlen);
                           ^~~~~~
   net/ipv4/ah4.c:133:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:133:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:140:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:140:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:190:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ah->auth_data, 0, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:190:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ah->auth_data, 0, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:200:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(iph+1, top_iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:200:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(iph+1, top_iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:249:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:249:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ah->auth_data, icv, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:256:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:256:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(top_iph+1, iph+1, top_iph->ihl*4 - sizeof(struct iphdr));
                   ^~~~~~
   net/ipv4/ah4.c:291:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb_network_header(skb), work_iph, ihl);
           ^~~~~~
   net/ipv4/ah4.c:291:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb_network_header(skb), work_iph, ihl);
           ^~~~~~
   net/ipv4/ah4.c:382:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(work_iph, iph, ihl);
           ^~~~~~
   net/ipv4/ah4.c:382:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(work_iph, iph, ihl);
           ^~~~~~
   net/ipv4/ah4.c:383:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(auth_data, ah->auth_data, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:383:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(auth_data, ah->auth_data, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:384:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ah->auth_data, 0, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:384:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ah->auth_data, 0, ahp->icv_trunc_len);
           ^~~~~~
   net/ipv4/ah4.c:427:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb_network_header(skb), work_iph, ihl);
           ^~~~~~
   net/ipv4/ah4.c:427:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb_network_header(skb), work_iph, ihl);
           ^~~~~~
   Suppressed 101 warnings (100 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   87 warnings generated.
>> drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(*data, "rxq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:219:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(*data, "rxq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(*data, "txq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:227:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                           sprintf(*data, "txq%d: %s", qidx + start_qidx,
                           ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, nicvf_hw_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:249:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(data, nicvf_drv_stats[stats].name, ETH_GSTRING_LEN);
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(data, "bgx_rxstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:262:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(data, "bgx_rxstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(data, "bgx_txstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:267:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(data, "bgx_txstat%d: ", stats);
                   ^~~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, NIC_VF_REG_COUNT);
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, NIC_VF_REG_COUNT);
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:669:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(hkey, rss->key, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:699:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(rss->key, hkey, RSS_HASH_KEY_SIZE * sizeof(u64));
                   ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(channel, 0, sizeof(*channel));
           ^~~~~~
   drivers/net/ethernet/cavium/thunder/nicvf_ethtool.c:713:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(channel, 0, sizeof(*channel));
           ^~~~~~
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   114 warnings generated.
   net/core/dst.c:140:2: warning: Value stored to 'dst' is never read [clang-analyzer-deadcode.DeadStores]
           dst = dst_destroy(dst);
           ^     ~~~~~~~~~~~~~~~~
   net/core/dst.c:140:2: note: Value stored to 'dst' is never read
           dst = dst_destroy(dst);
           ^     ~~~~~~~~~~~~~~~~
   net/core/dst.c:206:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(p->metrics, old_p->metrics, sizeof(p->metrics));
                   ^~~~~~
   net/core/dst.c:206:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(p->metrics, old_p->metrics, sizeof(p->metrics));
                   ^~~~~~
   net/core/dst.c:294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(dst + 1, 0, sizeof(*md_dst) + optslen - sizeof(*dst));
           ^~~~~~
   net/core/dst.c:294:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(dst + 1, 0, sizeof(*md_dst) + optslen - sizeof(*dst));
           ^~~~~~
   Suppressed 111 warnings (111 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   75 warnings generated.
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   98 warnings generated.
   net/core/neighbour.c:625:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(n->primary_key, pkey, key_len);
           ^~~~~~
   net/core/neighbour.c:625:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(n->primary_key, pkey, key_len);
           ^~~~~~
   net/core/neighbour.c:771:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(n->key, pkey, key_len);
           ^~~~~~
   net/core/neighbour.c:771:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(n->key, pkey, key_len);
           ^~~~~~
   net/core/neighbour.c:1386:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&neigh->ha, lladdr, dev->addr_len);

vim +69 drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c

9c7c85f7ea1fe5 Jonathan Kim 2019-06-19  59  
b4a7db71ea0602 Jonathan Kim 2020-09-01  60  static ssize_t amdgpu_pmu_event_show(struct device *dev,
b4a7db71ea0602 Jonathan Kim 2020-09-01  61  				struct device_attribute *attr, char *buf)
b4a7db71ea0602 Jonathan Kim 2020-09-01  62  {
b4a7db71ea0602 Jonathan Kim 2020-09-01  63  	struct amdgpu_pmu_event_attribute *amdgpu_pmu_attr;
b4a7db71ea0602 Jonathan Kim 2020-09-01  64  
b4a7db71ea0602 Jonathan Kim 2020-09-01  65  	amdgpu_pmu_attr = container_of(attr, struct amdgpu_pmu_event_attribute,
b4a7db71ea0602 Jonathan Kim 2020-09-01  66  									attr);
b4a7db71ea0602 Jonathan Kim 2020-09-01  67  
b4a7db71ea0602 Jonathan Kim 2020-09-01  68  	if (!amdgpu_pmu_attr->type)
b4a7db71ea0602 Jonathan Kim 2020-09-01 @69  		return sprintf(buf, "%s\n", amdgpu_pmu_attr->event_str);
b4a7db71ea0602 Jonathan Kim 2020-09-01  70  
b4a7db71ea0602 Jonathan Kim 2020-09-01  71  	return sprintf(buf, "%s,type=0x%x\n",
b4a7db71ea0602 Jonathan Kim 2020-09-01  72  			amdgpu_pmu_attr->event_str, amdgpu_pmu_attr->type);
b4a7db71ea0602 Jonathan Kim 2020-09-01  73  }
b4a7db71ea0602 Jonathan Kim 2020-09-01  74  

:::::: The code at line 69 was first introduced by commit
:::::: b4a7db71ea060218529e6a4c660c37687ecb5669 drm/amdgpu: add per device user friendly xgmi events for vega20

:::::: TO: Jonathan Kim <jonathan.kim@amd.com>
:::::: CC: Alex Deucher <alexander.deucher@amd.com>

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-03-22 20:20 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-03-22 20:20 [linux-next:master 11491/14215] drivers/gpu/drm/amd/amdgpu/amdgpu_pmu.c:69:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arg kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.