CC: [email protected]
CC: [email protected]
BCC: [email protected]
CC: [email protected]
TO: Arnd Bergmann <[email protected]>
CC: Masahiro Yamada <[email protected]>
CC: Alex Shi <[email protected]>
CC: Nick Desaulniers <[email protected]>
CC: Miguel Ojeda <[email protected]>
CC: Nathan Chancellor <[email protected]>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 
master
head:   ae085d7f9365de7da27ab5c0d16b12d51ea7fca9
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date:   2 weeks ago
:::::: branch date: 17 hours ago
:::::: commit date: 2 weeks ago
config: i386-randconfig-c001-20220328 
(https://download.01.org/0day-ci/archive/20220329/[email protected]/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 
0f6d9501cf49ce02937099350d08f20c4af86f3d)
reproduce (this is a W=1 build):
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
        git remote add linus 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
        # save the config file to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=i386 
clang-analyzer 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <[email protected]>


clang-analyzer warnings: (new ones prefixed by >>)
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/chemical/sps30_serial.c:207:3: note: Call to function 'memcpy' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(rsp, &priv->buf[SPS30_SERIAL_FRAME_MISO_DATA_OFFSET], 
rsp_size);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/chemical/sps30_serial.c:342:2: warning: Call to function 
'memcpy' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(buf + 1, &period, sizeof(period));
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/chemical/sps30_serial.c:342:2: note: Call to function 'memcpy' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(buf + 1, &period, sizeof(period));
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 24 warnings (24 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   17 warnings generated.
   sound/i2c/tea6330t.c:339:2: warning: Call to function 'strcat' is insecure 
as it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcat(card->mixername, ",TEA6330T");
           ^~~~~~
   sound/i2c/tea6330t.c:339:2: note: Call to function 'strcat' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcat'. CWE-119
           strcat(card->mixername, ",TEA6330T");
           ^~~~~~
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   35 warnings generated.
   drivers/char/xillybus/xillybus_class.c:66:3: warning: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(unit->name, UNITNAMELEN, "%s", prefix);
                   ^~~~~~~~
   drivers/char/xillybus/xillybus_class.c:66:3: note: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(unit->name, UNITNAMELEN, "%s", prefix);
                   ^~~~~~~~
   drivers/char/xillybus/xillybus_class.c:69:3: warning: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(unit->name, UNITNAMELEN, "%s_%02d",
                   ^~~~~~~~
   drivers/char/xillybus/xillybus_class.c:69:3: note: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(unit->name, UNITNAMELEN, "%s_%02d",
                   ^~~~~~~~
   drivers/char/xillybus/xillybus_class.c:118:3: warning: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(devname, sizeof(devname), "%s_%s",
                   ^~~~~~~~
   drivers/char/xillybus/xillybus_class.c:118:3: note: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(devname, sizeof(devname), "%s_%s",
                   ^~~~~~~~
   Suppressed 32 warnings (32 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   37 warnings generated.
   Suppressed 37 warnings (37 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   16 warnings generated.
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   26 warnings generated.
   Suppressed 26 warnings (26 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   40 warnings generated.
   sound/isa/cmi8330.c:300:2: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->mixername, (acard->type == CMI8329) ? "CMI8329" : 
"CMI8330/C3D");
           ^~~~~~
   sound/isa/cmi8330.c:300:2: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
           strcpy(card->mixername, (acard->type == CMI8329) ? "CMI8329" : 
"CMI8330/C3D");
           ^~~~~~
   sound/isa/cmi8330.c:440:2: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(pcm->name, (chip->type == CMI8329) ? "CMI8329" : "CMI8330");
           ^~~~~~
   sound/isa/cmi8330.c:440:2: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
           strcpy(pcm->name, (chip->type == CMI8329) ? "CMI8329" : "CMI8330");
           ^~~~~~
   sound/isa/cmi8330.c:595:2: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->driver, (acard->type == CMI8329) ? "CMI8329" : 
"CMI8330/C3D");
           ^~~~~~
   sound/isa/cmi8330.c:595:2: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
           strcpy(card->driver, (acard->type == CMI8329) ? "CMI8329" : 
"CMI8330/C3D");
           ^~~~~~
   sound/isa/cmi8330.c:596:2: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(card->shortname, (acard->type == CMI8329) ? "C-Media CMI8329" 
: "C-Media CMI8330/C3D");
           ^~~~~~
   sound/isa/cmi8330.c:596:2: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
           strcpy(card->shortname, (acard->type == CMI8329) ? "C-Media CMI8329" 
: "C-Media CMI8330/C3D");
           ^~~~~~
>> sound/isa/cmi8330.c:597:2: warning: Call to function 'sprintf' is insecure 
>> as it does not provide bounding of the memory buffer or security checks 
>> introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(card->longname, "%s at 0x%lx, irq %d, dma %d",
           ^~~~~~~
   sound/isa/cmi8330.c:597:2: note: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(card->longname, "%s at 0x%lx, irq %d, dma %d",
           ^~~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   19 warnings generated.
   drivers/w1/slaves/w1_ds28e04.c:137:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(buf, &data->memory[off], count);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/w1/slaves/w1_ds28e04.c:137:3: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
                   memcpy(buf, &data->memory[off], count);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   22 warnings generated.
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   22 warnings generated.
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   23 warnings generated.
   drivers/iio/chemical/bme680_core.c:741:2: warning: Value stored to 'ret' is 
never read [clang-analyzer-deadcode.DeadStores]
           ret = regmap_read(data->regmap, BME680_REG_MEAS_STAT_0, &check);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/iio/chemical/bme680_core.c:741:2: note: Value stored to 'ret' is 
never read
           ret = regmap_read(data->regmap, BME680_REG_MEAS_STAT_0, &check);
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   37 warnings generated.
   mm/dmapool.c:376:3: warning: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(retval, 0, pool->size);
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   mm/dmapool.c:376:3: note: Call to function 'memset' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(retval, 0, pool->size);
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   mm/dmapool.c:425:3: warning: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(vaddr, 0, pool->size);
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   mm/dmapool.c:425:3: note: Call to function 'memset' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(vaddr, 0, pool->size);
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   54 warnings generated.
   include/linux/list.h:137:13: warning: Use of memory after it is freed 
[clang-analyzer-unix.Malloc]
           __list_del(entry->prev, entry->next);
                      ^
   mm/hugetlb.c:6219:6: note: Assuming 'from' is <= 'to'
           if (from > to) {
               ^~~~~~~~~
   mm/hugetlb.c:6219:2: note: Taking false branch
           if (from > to) {
           ^
   mm/hugetlb.c:6229:6: note: Assuming the condition is false
           if (vm_flags & VM_NORESERVE)
               ^~~~~~~~~~~~~~~~~~~~~~~
   mm/hugetlb.c:6229:2: note: Taking false branch
           if (vm_flags & VM_NORESERVE)
           ^
   mm/hugetlb.c:6238:6: note: Assuming 'vma' is non-null
           if (!vma || vma->vm_flags & VM_MAYSHARE) {
               ^~~~
   mm/hugetlb.c:6238:6: note: Left side of '||' is false
   mm/hugetlb.c:6238:14: note: Assuming the condition is true
           if (!vma || vma->vm_flags & VM_MAYSHARE) {
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~
   mm/hugetlb.c:6238:2: note: Taking true branch
--
           ^
   kernel/trace/ftrace.c:4738:2: note: Taking true branch
           if (ftrace_hash_empty(old_hash))
           ^
   kernel/trace/ftrace.c:4739:3: note: Control jumps to line 4801
                   goto out_unlock;
                   ^
   kernel/trace/ftrace.c:4804:2: note: Calling 'release_probe'
           release_probe(probe);
           ^~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4513:10: note: Assuming field 'ref' is > 0
           WARN_ON(probe->ref <= 0);
                   ^
   include/asm-generic/bug.h:121:25: note: expanded from macro 'WARN_ON'
           int __ret_warn_on = !!(condition);                              \
                                  ^~~~~~~~~
   kernel/trace/ftrace.c:4513:2: note: Taking false branch
           WARN_ON(probe->ref <= 0);
           ^
   include/asm-generic/bug.h:122:2: note: expanded from macro 'WARN_ON'
           if (unlikely(__ret_warn_on))                                    \
           ^
   kernel/trace/ftrace.c:4518:6: note: Assuming field 'ref' is 0
           if (!probe->ref) {
               ^~~~~~~~~~~
   kernel/trace/ftrace.c:4518:2: note: Taking true branch
           if (!probe->ref) {
           ^
   kernel/trace/ftrace.c:4524:7: note: Assuming field 'free' is null
                   if (probe_ops->free)
                       ^~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4524:3: note: Taking false branch
                   if (probe_ops->free)
                   ^
   kernel/trace/ftrace.c:4527:3: note: Memory is released
                   kfree(probe);
                   ^~~~~~~~~~~~
   kernel/trace/ftrace.c:4804:2: note: Returning; memory was released
           release_probe(probe);
           ^~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4818:3: note: Returning; memory was released
                   unregister_ftrace_function_probe_func(NULL, tr, 
probe->probe_ops);
                   
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4817:2: note: Loop condition is true.  Entering loop 
body
           list_for_each_entry_safe(probe, n, &tr->func_probes, list)
           ^
   include/linux/list.h:725:2: note: expanded from macro 
'list_for_each_entry_safe'
           for (pos = list_first_entry(head, typeof(*pos), member),        \
           ^
   kernel/trace/ftrace.c:4818:3: note: Calling 
'unregister_ftrace_function_probe_func'
                   unregister_ftrace_function_probe_func(NULL, tr, 
probe->probe_ops);
                   
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4702:7: note: 'glob' is null
           if (!glob || !strlen(glob) || !strcmp(glob, "*"))
                ^~~~
   kernel/trace/ftrace.c:4702:12: note: Left side of '||' is true
           if (!glob || !strlen(glob) || !strcmp(glob, "*"))
                     ^
   kernel/trace/ftrace.c:4718:2: note: Loop condition is false. Execution 
continues on line 4722
           list_for_each_entry(probe, &tr->func_probes, list) {
           ^
   include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
           for (pos = list_first_entry(head, typeof(*pos), member);        \
           ^
   kernel/trace/ftrace.c:4722:6: note: Assuming the condition is false
           if (&probe->list == &tr->func_probes)
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:4722:2: note: Taking false branch
           if (&probe->list == &tr->func_probes)
           ^
   kernel/trace/ftrace.c:4726:8: note: Use of memory after it is freed
           if (!(probe->ops.flags & FTRACE_OPS_FL_INITIALIZED))
                 ^~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:7081:3: warning: Call to function 'memmove' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memmove_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(rec, rec + 1,
                   ^~~~~~~
   kernel/trace/ftrace.c:7081:3: note: Call to function 'memmove' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memmove_s' in case of C11
                   memmove(rec, rec + 1,
                   ^~~~~~~
   kernel/trace/ftrace.c:7131:2: warning: Value stored to 'ret' is never read 
[clang-analyzer-deadcode.DeadStores]
           ret = ftrace_process_locs(NULL,
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~
   kernel/trace/ftrace.c:7131:2: note: Value stored to 'ret' is never read
           ret = ftrace_process_locs(NULL,
           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~
   Suppressed 41 warnings (38 in non-user code, 3 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   38 warnings generated.
   drivers/thermal/intel/intel_menlow.c:309:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%lu", deci_kelvin_to_celsius(value));
                  ^~~~~~~
   drivers/thermal/intel/intel_menlow.c:309:9: note: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%lu", deci_kelvin_to_celsius(value));
                  ^~~~~~~
   drivers/thermal/intel/intel_menlow.c:332:7: warning: Call to function 
'sscanf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           if (!sscanf(buf, "%d", &value))
                ^~~~~~
   drivers/thermal/intel/intel_menlow.c:332:7: note: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11
           if (!sscanf(buf, "%d", &value))
                ^~~~~~
>> drivers/thermal/intel/intel_menlow.c:369:9: warning: Call to function 
>> 'sprintf' is insecure as it does not provide bounding of the memory buffer 
>> or security checks introduced in the C11 standard. Replace with analogous 
>> functions that support length arguments or provides boundary checks such as 
>> 'sprintf_s' in case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", bios_enabled ? "enabled" : "disabled");
                  ^~~~~~~
   drivers/thermal/intel/intel_menlow.c:369:9: note: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s\n", bios_enabled ? "enabled" : "disabled");
                  ^~~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   64 warnings generated.
   drivers/pcmcia/pcmcia_cis.c:358:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(*get->buf, tuple->TupleData, tuple->TupleDataLen);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/pcmcia/pcmcia_cis.c:358:3: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
                   memcpy(*get->buf, tuple->TupleData, tuple->TupleDataLen);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 63 warnings (63 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   35 warnings generated.
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   drivers/pcmcia/rsrc_nonstatic.c:1104:8: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           ret = sscanf(buf, "+ 0x%lx - 0x%lx", &start_addr, &end_addr);
                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1104:8: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
           ret = sscanf(buf, "+ 0x%lx - 0x%lx", &start_addr, &end_addr);
                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1106:9: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   ret = sscanf(buf, "- 0x%lx - 0x%lx", &start_addr, &end_addr);
                         ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1106:9: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
                   ret = sscanf(buf, "- 0x%lx - 0x%lx", &start_addr, &end_addr);
                         ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1109:10: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           ret = sscanf(buf, "0x%lx - 0x%lx", &start_addr,
                                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1109:10: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
                           ret = sscanf(buf, "0x%lx - 0x%lx", &start_addr,
                                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1170:8: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           ret = sscanf(buf, "+ 0x%lx - 0x%lx", &start_addr, &end_addr);
                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1170:8: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
           ret = sscanf(buf, "+ 0x%lx - 0x%lx", &start_addr, &end_addr);
                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1172:9: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   ret = sscanf(buf, "- 0x%lx - 0x%lx", &start_addr, &end_addr);
                         ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1172:9: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
                   ret = sscanf(buf, "- 0x%lx - 0x%lx", &start_addr, &end_addr);
                         ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1175:10: warning: Call to function 'sscanf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           ret = sscanf(buf, "0x%lx - 0x%lx", &start_addr,
                                 ^~~~~~
   drivers/pcmcia/rsrc_nonstatic.c:1175:10: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
                           ret = sscanf(buf, "0x%lx - 0x%lx", &start_addr,
                                 ^~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   46 warnings generated.
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:407:2: warning: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data, st->buffer, sizeof(data));
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:407:2: note: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data, st->buffer, sizeof(data));
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:788:3: warning: Call to 
function 'memset' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&buffer, 0, sizeof(buffer));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:788:3: note: Call to 
function 'memset' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&buffer, 0, sizeof(buffer));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:789:3: warning: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&buffer.gyro, gyro, sizeof(buffer.gyro));
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   drivers/iio/imu/inv_icm42600/inv_icm42600_gyro.c:789:3: note: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(&buffer.gyro, gyro, sizeof(buffer.gyro));
--
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:984:2: note: Taking false branch
           if (sk->sk_type == SOCK_SEQPACKET) {
           ^
   net/ax25/af_ax25.c:1042:3: note: Calling 'ax25_destroy_socket'
                   ax25_destroy_socket(ax25);
                   ^~~~~~~~~~~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:299:2: note: Calling 'ax25_cb_del'
           ax25_cb_del(ax25);
           ^~~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:65:2: note: Taking true branch
           if (!hlist_unhashed(&ax25->ax25_node)) {
           ^
   net/ax25/af_ax25.c:69:3: note: Calling 'ax25_cb_put'
                   ax25_cb_put(ax25);
                   ^~~~~~~~~~~~~~~~~
   include/net/ax25.h:291:2: note: Taking true branch
           if (refcount_dec_and_test(&ax25->refcount)) {
           ^
   include/net/ax25.h:293:3: note: Memory is released
                   kfree(ax25);
                   ^~~~~~~~~~~
   net/ax25/af_ax25.c:69:3: note: Returning; memory was released via 1st 
parameter
                   ax25_cb_put(ax25);
                   ^~~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:299:2: note: Returning; memory was released via 1st 
parameter
           ax25_cb_del(ax25);
           ^~~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:301:2: note: Use of memory after it is freed
           ax25_stop_heartbeat(ax25);
           ^                   ~~~~
   net/ax25/af_ax25.c:653:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(devname, 0, sizeof(devname));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:653:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(devname, 0, sizeof(devname));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1425:2: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fsa, 0, sizeof(*fsa));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1425:2: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(fsa, 0, sizeof(*fsa));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1450:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&fsa->fsa_digipeater[0],
                           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1450:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(&fsa->fsa_digipeater[0],
                           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1676:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(sax, 0, sizeof(struct full_sockaddr_ax25));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ax25/af_ax25.c:1676:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(sax, 0, sizeof(struct full_sockaddr_ax25));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   Suppressed 83 warnings (83 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   22 warnings generated.
   sound/synth/emux/emux_oss.c:63:2: warning: Call to function 'strcpy' is 
insecure as it does not provide bounding of the memory buffer. Replace 
unbounded copy functions with analogous functions that support length arguments 
such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(dev->name, emu->name);
           ^~~~~~
   sound/synth/emux/emux_oss.c:63:2: note: Call to function 'strcpy' is 
insecure as it does not provide bounding of the memory buffer. Replace 
unbounded copy functions with analogous functions that support length arguments 
such as 'strlcpy'. CWE-119
           strcpy(dev->name, emu->name);
           ^~~~~~
   sound/synth/emux/emux_oss.c:110:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&callback, 0, sizeof(callback));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   sound/synth/emux/emux_oss.c:110:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&callback, 0, sizeof(callback));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
>> sound/synth/emux/emux_oss.c:114:2: warning: Call to function 'sprintf' is 
>> insecure as it does not provide bounding of the memory buffer or security 
>> checks introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(tmpname, "%s OSS Port", emu->name);
           ^~~~~~~
   sound/synth/emux/emux_oss.c:114:2: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           sprintf(tmpname, "%s OSS Port", emu->name);
           ^~~~~~~
   sound/synth/emux/emux_oss.c:484:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ev, 0, sizeof(ev));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   sound/synth/emux/emux_oss.c:484:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&ev, 0, sizeof(ev));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   61 warnings generated.
   Suppressed 61 warnings (61 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   63 warnings generated.
   net/802/psnap.c:84:2: warning: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb_push(skb, 5), dl->type, 5);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/802/psnap.c:84:2: note: Call to function 'memcpy' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(skb_push(skb, 5), dl->type, 5);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/802/psnap.c:137:3: warning: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(proto->type, desc, 5);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/802/psnap.c:137:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(proto->type, desc, 5);
                   ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 61 warnings (61 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   66 warnings generated.
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   net/core/flow_offload.c:208:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(cookie->cookie, data, len);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/core/flow_offload.c:208:2: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
           memcpy(cookie->cookie, data, len);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/core/flow_offload.c:388:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&bo, 0, sizeof(bo));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/core/flow_offload.c:388:3: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(&bo, 0, sizeof(bo));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   98 warnings generated.
   include/net/dst_metadata.h:74:18: warning: Access to field 'type' results in 
a dereference of a null pointer (loaded from variable 'a') 
[clang-analyzer-core.NullDereference]
           if (!a != !b || a->type != b->type)
                           ^
   net/core/gro.c:739:37: note: Calling 'dev_gro_receive'
           ret = napi_frags_finish(napi, skb, dev_gro_receive(napi, skb));
                                              ^~~~~~~~~~~~~~~~~~~~~~~~~~
   net/core/gro.c:450:2: note: Taking false branch
           if (netif_elide_gro(skb->dev))
           ^
   net/core/gro.c:453:2: note: Calling 'gro_list_prepare'
           gro_list_prepare(&gro_list->list, skb);
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/core/gro.c:327:2: note: Loop condition is true.  Entering loop body
           list_for_each_entry(p, head, list) {
           ^
   include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
           for (pos = list_first_entry(head, typeof(*pos), member);        \
           ^
   net/core/gro.c:332:7: note: Assuming the condition is false
                   if (hash != skb_get_hash_raw(p)) {
--
                           ^~~~~~~~~~~~~~~~
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   99 warnings generated.
   Suppressed 99 warnings (99 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   Suppressed 67 warnings (67 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   99 warnings generated.
   Suppressed 99 warnings (99 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   72 warnings generated.
   Suppressed 72 warnings (72 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   57 warnings generated.
   Suppressed 57 warnings (57 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   86 warnings generated.
   Suppressed 86 warnings (86 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   80 warnings generated.
   Suppressed 80 warnings (80 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   Suppressed 67 warnings (67 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   38 warnings generated.
   sound/virtio/virtio_card.c:37:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(event, 0, sizeof(*event));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   sound/virtio/virtio_card.c:37:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(event, 0, sizeof(*event));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   sound/virtio/virtio_card.c:217:3: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(snd->card->longname, sizeof(snd->card->longname),
                   ^~~~~~~~
   sound/virtio/virtio_card.c:217:3: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
                   snprintf(snd->card->longname, sizeof(snd->card->longname),
                   ^~~~~~~~
   sound/virtio/virtio_card.c:222:3: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(snd->card->longname, sizeof(snd->card->longname),
                   ^~~~~~~~
   sound/virtio/virtio_card.c:222:3: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
                   snprintf(snd->card->longname, sizeof(snd->card->longname),
                   ^~~~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   68 warnings generated.
   net/core/net_namespace.c:115:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&ng->ptr[MIN_PERNET_OPS_ID], &old_ng->ptr[MIN_PERNET_OPS_ID],
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/core/net_namespace.c:115:2: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
           memcpy(&ng->ptr[MIN_PERNET_OPS_ID], &old_ng->ptr[MIN_PERNET_OPS_ID],
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 67 warnings (67 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   16 warnings generated.
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   16 warnings generated.
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   73 warnings generated.
   Suppressed 73 warnings (73 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   36 warnings generated.
>> sound/isa/ad1816a/ad1816a.c:150:2: warning: Call to function 'sprintf' is 
>> insecure as it does not provide bounding of the memory buffer or security 
>> checks introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(card->longname, "%s, SS at 0x%lx, irq %d, dma %d&%d",
           ^~~~~~~
   sound/isa/ad1816a/ad1816a.c:150:2: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           sprintf(card->longname, "%s, SS at 0x%lx, irq %d, dma %d&%d",
           ^~~~~~~
   Suppressed 35 warnings (35 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   24 warnings generated.
   drivers/cpufreq/freq_table.c:257:12: warning: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   count += sprintf(&buf[count], "%d ", pos->frequency);
                            ^~~~~~~
   drivers/cpufreq/freq_table.c:257:12: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
                   count += sprintf(&buf[count], "%d ", pos->frequency);
                            ^~~~~~~
   drivers/cpufreq/freq_table.c:259:11: warning: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           count += sprintf(&buf[count], "\n");
                    ^~~~~~~
   drivers/cpufreq/freq_table.c:259:11: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           count += sprintf(&buf[count], "\n");
                    ^~~~~~~
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   22 warnings generated.
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   22 warnings generated.
   Suppressed 22 warnings (22 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   94 warnings generated.
   net/ipv6/inet6_connection_sock.c:37:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fl6, 0, sizeof(*fl6));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ipv6/inet6_connection_sock.c:37:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(fl6, 0, sizeof(*fl6));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ipv6/inet6_connection_sock.c:87:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fl6, 0, sizeof(*fl6));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   net/ipv6/inet6_connection_sock.c:87:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(fl6, 0, sizeof(*fl6));
           ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)
                               ^~~~~~~~~~~~~~~~
   Suppressed 92 warnings (92 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   84 warnings generated.
   net/ipv6/udp_offload.c:94:3: warning: Call to function 'memmove' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memmove_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(packet_start-frag_hdr_sz, packet_start, unfrag_len);
                   ^~~~~~~
   net/ipv6/udp_offload.c:94:3: note: Call to function 'memmove' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memmove_s' in case of C11
                   memmove(packet_start-frag_hdr_sz, packet_start, unfrag_len);
                   ^~~~~~~
   Suppressed 83 warnings (83 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   77 warnings generated.
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   77 warnings generated.
   Suppressed 77 warnings (77 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   65 warnings generated.
   net/hsr/hsr_framereg.c:393:2: warning: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&eth_hdr(skb)->h_source, node->macaddress_A, ETH_ALEN);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   net/hsr/hsr_framereg.c:393:2: note: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
           memcpy(&eth_hdr(skb)->h_source, node->macaddress_A, ETH_ALEN);
           ^
   arch/x86/include/asm/string_32.h:150:25: note: expanded from macro 'memcpy'
   #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
                           ^~~~~~~~~~~~~~~~
   Suppressed 64 warnings (64 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   64 warnings generated.
   Suppressed 64 warnings (64 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   82 warnings generated.
   Suppressed 82 warnings (82 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   65 warnings generated.
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   69 warnings generated.
   net/qrtr/af_qrtr.c:1061:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(addr, 0, sizeof(*addr));
                   ^
   arch/x86/include/asm/string_32.h:195:29: note: expanded from macro 'memset'
   #define memset(s, c, count) __builtin_memset(s, c, count)

vim +597 sound/isa/cmi8330.c

^1da177e4c3f41 Linus Torvalds  2005-04-16  521  
1bff292e9abec7 Bill Pemberton  2012-12-06  522  static int 
snd_cmi8330_probe(struct snd_card *card, int dev)
acdcbc15426b91 Takashi Iwai    2005-11-17  523  {
acdcbc15426b91 Takashi Iwai    2005-11-17  524          struct snd_cmi8330 
*acard;
acdcbc15426b91 Takashi Iwai    2005-11-17  525          int i, err;
48972cc5101dee Krzysztof Helt  2009-01-21  526          struct snd_opl3 *opl3;
acdcbc15426b91 Takashi Iwai    2005-11-17  527  
acdcbc15426b91 Takashi Iwai    2005-11-17  528          acard = 
card->private_data;
760fc6b838d8c7 Krzysztof Helt  2008-07-31  529          err = 
snd_wss_create(card, wssport[dev] + 4, -1,
^1da177e4c3f41 Linus Torvalds  2005-04-16  530                               
wssirq[dev],
760fc6b838d8c7 Krzysztof Helt  2008-07-31  531                               
wssdma[dev], -1,
760fc6b838d8c7 Krzysztof Helt  2008-07-31  532                               
WSS_HW_DETECT, 0, &acard->wss);
760fc6b838d8c7 Krzysztof Helt  2008-07-31  533          if (err < 0) {
69eb88825a7a56 Ondrej Zary     2009-07-04  534                  
snd_printk(KERN_ERR PFX "AD1848 device busy??\n");
acdcbc15426b91 Takashi Iwai    2005-11-17  535                  return err;
^1da177e4c3f41 Linus Torvalds  2005-04-16  536          }
ece11c9b6db5b9 Krzysztof Helt  2008-07-31  537          if 
(acard->wss->hardware != WSS_HW_CMI8330) {
69eb88825a7a56 Ondrej Zary     2009-07-04  538                  
snd_printk(KERN_ERR PFX "AD1848 not found during probe\n");
acdcbc15426b91 Takashi Iwai    2005-11-17  539                  return -ENODEV;
^1da177e4c3f41 Linus Torvalds  2005-04-16  540          }
^1da177e4c3f41 Linus Torvalds  2005-04-16  541  
3e38150bf238bb Takashi Iwai    2021-06-08  542          err = 
snd_sbdsp_create(card, sbport[dev],
^1da177e4c3f41 Linus Torvalds  2005-04-16  543                                 
sbirq[dev],
^1da177e4c3f41 Linus Torvalds  2005-04-16  544                                 
snd_sb16dsp_interrupt,
^1da177e4c3f41 Linus Torvalds  2005-04-16  545                                 
sbdma8[dev],
^1da177e4c3f41 Linus Torvalds  2005-04-16  546                                 
sbdma16[dev],
3e38150bf238bb Takashi Iwai    2021-06-08  547                                 
SB_HW_AUTO, &acard->sb);
3e38150bf238bb Takashi Iwai    2021-06-08  548          if (err < 0) {
69eb88825a7a56 Ondrej Zary     2009-07-04  549                  
snd_printk(KERN_ERR PFX "SB16 device busy??\n");
acdcbc15426b91 Takashi Iwai    2005-11-17  550                  return err;
^1da177e4c3f41 Linus Torvalds  2005-04-16  551          }
^1da177e4c3f41 Linus Torvalds  2005-04-16  552          if (acard->sb->hardware 
!= SB_HW_16) {
69eb88825a7a56 Ondrej Zary     2009-07-04  553                  
snd_printk(KERN_ERR PFX "SB16 not found during probe\n");
31028cbed26a8a Zhen Lei        2021-07-07  554                  return -ENODEV;
^1da177e4c3f41 Linus Torvalds  2005-04-16  555          }
^1da177e4c3f41 Linus Torvalds  2005-04-16  556  
760fc6b838d8c7 Krzysztof Helt  2008-07-31  557          snd_wss_out(acard->wss, 
CS4231_MISC_INFO, 0x40); /* switch on MODE2 */
^1da177e4c3f41 Linus Torvalds  2005-04-16  558          for (i = 
CMI8330_RMUX3D; i <= CMI8330_CDINGAIN; i++)
760fc6b838d8c7 Krzysztof Helt  2008-07-31  559                  
snd_wss_out(acard->wss, i,
760fc6b838d8c7 Krzysztof Helt  2008-07-31  560                              
snd_cmi8330_image[i - CMI8330_RMUX3D]);
^1da177e4c3f41 Linus Torvalds  2005-04-16  561  
3e38150bf238bb Takashi Iwai    2021-06-08  562          err = 
snd_cmi8330_mixer(card, acard);
3e38150bf238bb Takashi Iwai    2021-06-08  563          if (err < 0) {
43bcd973d6d05d Takashi Iwai    2005-09-05  564                  
snd_printk(KERN_ERR PFX "failed to create mixers\n");
acdcbc15426b91 Takashi Iwai    2005-11-17  565                  return err;
^1da177e4c3f41 Linus Torvalds  2005-04-16  566          }
^1da177e4c3f41 Linus Torvalds  2005-04-16  567  
3e38150bf238bb Takashi Iwai    2021-06-08  568          err = 
snd_cmi8330_pcm(card, acard);
3e38150bf238bb Takashi Iwai    2021-06-08  569          if (err < 0) {
43bcd973d6d05d Takashi Iwai    2005-09-05  570                  
snd_printk(KERN_ERR PFX "failed to create pcms\n");
acdcbc15426b91 Takashi Iwai    2005-11-17  571                  return err;
^1da177e4c3f41 Linus Torvalds  2005-04-16  572          }
48972cc5101dee Krzysztof Helt  2009-01-21  573          if (fmport[dev] != 
SNDRV_AUTO_PORT) {
48972cc5101dee Krzysztof Helt  2009-01-21  574                  if 
(snd_opl3_create(card,
48972cc5101dee Krzysztof Helt  2009-01-21  575                                  
    fmport[dev], fmport[dev] + 2,
48972cc5101dee Krzysztof Helt  2009-01-21  576                                  
    OPL3_HW_AUTO, 0, &opl3) < 0) {
48972cc5101dee Krzysztof Helt  2009-01-21  577                          
snd_printk(KERN_ERR PFX
48972cc5101dee Krzysztof Helt  2009-01-21  578                                  
   "no OPL device at 0x%lx-0x%lx ?\n",
48972cc5101dee Krzysztof Helt  2009-01-21  579                                  
   fmport[dev], fmport[dev] + 2);
48972cc5101dee Krzysztof Helt  2009-01-21  580                  } else {
48972cc5101dee Krzysztof Helt  2009-01-21  581                          err = 
snd_opl3_hwdep_new(opl3, 0, 1, NULL);
48972cc5101dee Krzysztof Helt  2009-01-21  582                          if (err 
< 0)
48972cc5101dee Krzysztof Helt  2009-01-21  583                                  
return err;
48972cc5101dee Krzysztof Helt  2009-01-21  584                  }
48972cc5101dee Krzysztof Helt  2009-01-21  585          }
48972cc5101dee Krzysztof Helt  2009-01-21  586  
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  587          if (mpuport[dev] != 
SNDRV_AUTO_PORT) {
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  588                  if 
(snd_mpu401_uart_new(card, 0, MPU401_HW_MPU401,
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  589                                  
        mpuport[dev], 0, mpuirq[dev],
dba8b46992c559 Clemens Ladisch 2011-09-13  590                                  
        NULL) < 0)
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  591                          
printk(KERN_ERR PFX "no MPU-401 device at 0x%lx.\n",
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  592                                  
mpuport[dev]);
c97dff84e0d9a4 Krzysztof Helt  2009-01-29  593          }
^1da177e4c3f41 Linus Torvalds  2005-04-16  594  
69eb88825a7a56 Ondrej Zary     2009-07-04  595          strcpy(card->driver, 
(acard->type == CMI8329) ? "CMI8329" : "CMI8330/C3D");
69eb88825a7a56 Ondrej Zary     2009-07-04  596          strcpy(card->shortname, 
(acard->type == CMI8329) ? "C-Media CMI8329" : "C-Media CMI8330/C3D");
^1da177e4c3f41 Linus Torvalds  2005-04-16 @597          sprintf(card->longname, 
"%s at 0x%lx, irq %d, dma %d",
^1da177e4c3f41 Linus Torvalds  2005-04-16  598                  card->shortname,
^1da177e4c3f41 Linus Torvalds  2005-04-16  599                  
acard->wss->port,
^1da177e4c3f41 Linus Torvalds  2005-04-16  600                  wssirq[dev],
^1da177e4c3f41 Linus Torvalds  2005-04-16  601                  wssdma[dev]);
^1da177e4c3f41 Linus Torvalds  2005-04-16  602  
acdcbc15426b91 Takashi Iwai    2005-11-17  603          return 
snd_card_register(card);
acdcbc15426b91 Takashi Iwai    2005-11-17  604  }
43bcd973d6d05d Takashi Iwai    2005-09-05  605  

:::::: The code at line 597 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2

:::::: TO: Linus Torvalds <[email protected]>
:::::: CC: Linus Torvalds <[email protected]>

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to