CC: [email protected] CC: [email protected] BCC: [email protected] CC: [email protected] TO: "Liam R. Howlett" <[email protected]> CC: Johannes Weiner <[email protected]> CC: "Matthew Wilcox (Oracle)" <[email protected]> CC: Andrew Morton <[email protected]> CC: Linux Memory Management List <[email protected]>
tree: https://github.com/hnaz/linux-mm master head: bf4803abaa3e9d2fa207c0675a2d2abf0fd44f66 commit: c11c433e3be4e5bef47f0a62a72064e18708e952 [280/410] Maple Tree: add new data structure :::::: branch date: 4 days ago :::::: commit date: 4 days ago config: arm-randconfig-c002-20220429 (https://download.01.org/0day-ci/archive/20220501/[email protected]/config) compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 400775649969b9baf3bc2a510266e7912bb16ae9) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # install arm cross compiling tool for clang build # apt-get install binutils-arm-linux-gnueabi # https://github.com/hnaz/linux-mm/commit/c11c433e3be4e5bef47f0a62a72064e18708e952 git remote add hnaz-mm https://github.com/hnaz/linux-mm git fetch --no-tags hnaz-mm master git checkout c11c433e3be4e5bef47f0a62a72064e18708e952 # save the config file COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm clang-analyzer If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot <[email protected]> clang-analyzer warnings: (new ones prefixed by >>) 49 warnings generated. fs/erofs/data.c:269:20: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult] if (!(map.m_flags & EROFS_MAP_MAPPED)) { ~~~~~~~~~~~ ^ fs/erofs/data.c:248:8: note: Calling 'erofs_map_blocks' ret = erofs_map_blocks(inode, &map, EROFS_GET_BLOCKS_RAW); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:126:2: note: Calling 'trace_erofs_map_blocks_enter' trace_erofs_map_blocks_enter(inode, map, flags); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/trace/events/erofs.h:172:1: note: Returning without writing to 'map->m_flags' DEFINE_EVENT(erofs__map_blocks_enter, erofs_map_blocks_enter, ^ include/linux/tracepoint.h:542:2: note: expanded from macro 'DEFINE_EVENT' DECLARE_TRACE(name, PARAMS(proto), PARAMS(args)) ^ include/linux/tracepoint.h:419:2: note: expanded from macro 'DECLARE_TRACE' __DECLARE_TRACE(name, PARAMS(proto), PARAMS(args), \ ^ include/linux/tracepoint.h:343:4: note: expanded from macro '__DECLARE_TRACE' { } \ ^ fs/erofs/data.c:126:2: note: Returning from 'trace_erofs_map_blocks_enter' trace_erofs_map_blocks_enter(inode, map, flags); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:128:6: note: Assuming field 'm_la' is < field 'i_size' if (map->m_la >= inode->i_size) { ^~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:128:2: note: Taking false branch if (map->m_la >= inode->i_size) { ^ fs/erofs/data.c:135:6: note: Assuming field 'datalayout' is equal to EROFS_INODE_CHUNK_BASED if (vi->datalayout != EROFS_INODE_CHUNK_BASED) { ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:135:2: note: Taking false branch if (vi->datalayout != EROFS_INODE_CHUNK_BASED) { ^ fs/erofs/data.c:140:6: note: Assuming the condition is false if (vi->chunkformat & EROFS_CHUNK_FORMAT_INDEXES) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:140:2: note: Taking false branch if (vi->chunkformat & EROFS_CHUNK_FORMAT_INDEXES) ^ fs/erofs/data.c:150:2: note: Taking true branch if (IS_ERR(kaddr)) { ^ fs/erofs/data.c:152:3: note: Control jumps to line 186 goto out; ^ fs/erofs/data.c:186:7: note: 'err' is not equal to 0 if (!err) ^~~ fs/erofs/data.c:186:2: note: Taking false branch if (!err) ^ fs/erofs/data.c:188:2: note: Calling 'trace_erofs_map_blocks_exit' trace_erofs_map_blocks_exit(inode, map, flags, 0); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/trace/events/erofs.h:224:1: note: Returning without writing to 'map->m_flags' DEFINE_EVENT(erofs__map_blocks_exit, erofs_map_blocks_exit, ^ include/linux/tracepoint.h:542:2: note: expanded from macro 'DEFINE_EVENT' DECLARE_TRACE(name, PARAMS(proto), PARAMS(args)) ^ include/linux/tracepoint.h:419:2: note: expanded from macro 'DECLARE_TRACE' __DECLARE_TRACE(name, PARAMS(proto), PARAMS(args), \ ^ include/linux/tracepoint.h:343:4: note: expanded from macro '__DECLARE_TRACE' { } \ ^ fs/erofs/data.c:188:2: note: Returning from 'trace_erofs_map_blocks_exit' trace_erofs_map_blocks_exit(inode, map, flags, 0); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:189:2: note: Returning without writing to 'map->m_flags' return err; ^ fs/erofs/data.c:248:8: note: Returning from 'erofs_map_blocks' ret = erofs_map_blocks(inode, &map, EROFS_GET_BLOCKS_RAW); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ fs/erofs/data.c:249:6: note: 'ret' is >= 0 if (ret < 0) ^~~ fs/erofs/data.c:249:2: note: Taking false branch if (ret < 0) ^ fs/erofs/data.c:257:6: note: Assuming 'ret' is 0 if (ret) ^~~ fs/erofs/data.c:257:2: note: Taking false branch if (ret) ^ fs/erofs/data.c:261:2: note: Taking false branch if (flags & IOMAP_DAX) ^ fs/erofs/data.c:269:20: note: The left operand of '&' is a garbage value if (!(map.m_flags & EROFS_MAP_MAPPED)) { ~~~~~~~~~~~ ^ Suppressed 48 warnings (48 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 64 warnings generated. >> lib/maple_tree.c:326:2: warning: Value stored to 'node' is never read >> [clang-analyzer-deadcode.DeadStores] node = (void *)((unsigned long)node & ~MAPLE_ENODE_NULL); ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:326:2: note: Value stored to 'node' is never read node = (void *)((unsigned long)node & ~MAPLE_ENODE_NULL); ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:331:2: warning: Value stored to 'node' is never read [clang-analyzer-deadcode.DeadStores] node = (void *)((unsigned long)node | MAPLE_ENODE_NULL); ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:331:2: note: Value stored to 'node' is never read node = (void *)((unsigned long)node | MAPLE_ENODE_NULL); ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:1174:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(reuse, 0, sizeof(*reuse)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1174:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(reuse, 0, sizeof(*reuse)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ >> lib/maple_tree.c:1206:23: warning: Value stored to 'nodep' during its >> initialization is never read [clang-analyzer-deadcode.DeadStores] struct maple_alloc **nodep = &mas->alloc; ^~~~~ ~~~~~~~~~~~ lib/maple_tree.c:1206:23: note: Value stored to 'nodep' during its initialization is never read struct maple_alloc **nodep = &mas->alloc; ^~~~~ ~~~~~~~~~~~ lib/maple_tree.c:1218:20: warning: Access to field 'node_count' results in a dereference of a null pointer (loaded from field 'alloc') [clang-analyzer-core.NullDereference] if (!allocated || mas->alloc->node_count == MAPLE_ALLOC_SLOTS - 1) { ^ lib/maple_tree.c:6222:2: note: Calling 'trace_ma_op' trace_ma_op(__func__, &mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ include/trace/events/maple_tree.h:13:1: note: Returning without writing to 'mas->alloc', which participates in a condition later TRACE_EVENT(ma_op, ^ include/linux/tracepoint.h:553:2: note: expanded from macro 'TRACE_EVENT' DECLARE_TRACE(name, PARAMS(proto), PARAMS(args)) ^ include/linux/tracepoint.h:419:2: note: expanded from macro 'DECLARE_TRACE' __DECLARE_TRACE(name, PARAMS(proto), PARAMS(args), \ ^ include/linux/tracepoint.h:343:4: note: expanded from macro '__DECLARE_TRACE' { } \ ^ include/trace/events/maple_tree.h:13:1: note: Returning without writing to 'mas->alloc' TRACE_EVENT(ma_op, ^ include/linux/tracepoint.h:553:2: note: expanded from macro 'TRACE_EVENT' DECLARE_TRACE(name, PARAMS(proto), PARAMS(args)) ^ include/linux/tracepoint.h:419:2: note: expanded from macro 'DECLARE_TRACE' __DECLARE_TRACE(name, PARAMS(proto), PARAMS(args), \ ^ include/linux/tracepoint.h:343:4: note: expanded from macro '__DECLARE_TRACE' { } \ ^ lib/maple_tree.c:6222:2: note: Returning from 'trace_ma_op' trace_ma_op(__func__, &mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Calling 'mas_is_none' if (mas_is_none(mas) || mas_is_paused(mas)) ^~~~~~~~~~~~~~~~ include/linux/maple_tree.h:477:2: note: Returning without writing to 'mas->alloc', which participates in a condition later return mas->node == MAS_NONE; ^ include/linux/maple_tree.h:477:2: note: Returning without writing to 'mas->alloc' lib/maple_tree.c:5935:6: note: Returning from 'mas_is_none' if (mas_is_none(mas) || mas_is_paused(mas)) ^~~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false lib/maple_tree.c:5935:26: note: Calling 'mas_is_paused' if (mas_is_none(mas) || mas_is_paused(mas)) ^~~~~~~~~~~~~~~~~~ include/linux/maple_tree.h:483:2: note: Returning without writing to 'mas->alloc', which participates in a condition later return mas->node == MAS_PAUSE; ^ include/linux/maple_tree.h:483:2: note: Returning without writing to 'mas->alloc' lib/maple_tree.c:5935:26: note: Returning from 'mas_is_paused' if (mas_is_none(mas) || mas_is_paused(mas)) ^~~~~~~~~~~~~~~~~~ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5939:10: note: Calling 'mas_state_walk' entry = mas_state_walk(mas); ^~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3745:10: note: Calling 'mas_start' entry = mas_start(mas); ^~~~~~~~~~~~~~ lib/maple_tree.c:1322:13: note: Calling 'mas_is_start' if (likely(mas_is_start(mas))) { ^ include/linux/compiler.h:77:40: note: expanded from macro 'likely' # define likely(x) __builtin_expect(!!(x), 1) ^ lib/maple_tree.c:243:2: note: Returning without writing to 'mas->alloc', which participates in a condition later return mas->node == MAS_START; ^ lib/maple_tree.c:243:2: note: Returning without writing to 'mas->alloc' lib/maple_tree.c:1322:13: note: Returning from 'mas_is_start' if (likely(mas_is_start(mas))) { ^ include/linux/compiler.h:77:40: note: expanded from macro 'likely' # define likely(x) __builtin_expect(!!(x), 1) ^ lib/maple_tree.c:1322:2: note: Taking true branch if (likely(mas_is_start(mas))) { ^ lib/maple_tree.c:1331:10: note: Calling 'mas_root' root = mas_root(mas); ^~~~~~~~~~~~~ lib/maple_tree.c:844:9: note: Left side of '||' is false return rcu_dereference_check(mas->tree->ma_root, mt_locked(mas->tree)); ^ include/linux/rcupdate.h:531:2: note: expanded from macro 'rcu_dereference_check' __rcu_dereference_check((p), __UNIQUE_ID(rcu), \ ^ include/linux/rcupdate.h:391:43: note: expanded from macro '__rcu_dereference_check' -- if (likely(mas->node != MA_ERROR(-ENOMEM))) { ^ include/linux/compiler.h:77:40: note: expanded from macro 'likely' # define likely(x) __builtin_expect(!!(x), 1) ^ lib/maple_tree.c:5965:2: note: Taking false branch if (likely(mas->node != MA_ERROR(-ENOMEM))) { ^ lib/maple_tree.c:5970:6: note: Left side of '&&' is true if (gfpflags_allow_blocking(gfp) && !mt_external_lock(mas->tree)) { ^ lib/maple_tree.c:5970:2: note: Taking false branch if (gfpflags_allow_blocking(gfp) && !mt_external_lock(mas->tree)) { ^ lib/maple_tree.c:5975:3: note: Calling 'mas_alloc_nodes' mas_alloc_nodes(mas, gfp); ^~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:1207:28: note: Calling 'mas_allocated' unsigned long allocated = mas_allocated(mas); ^~~~~~~~~~~~~~~~~~ lib/maple_tree.c:564:6: note: Assuming field 'alloc' is non-null, which participates in a condition later if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) ^~~~~~~~~~~ lib/maple_tree.c:564:6: note: Left side of '||' is false lib/maple_tree.c:564:22: note: Assuming the condition is false if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:564:2: note: Taking false branch if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) ^ lib/maple_tree.c:567:2: note: Returning value, which participates in a condition later return mas->alloc->total; ^~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:1207:28: note: Returning from 'mas_allocated' unsigned long allocated = mas_allocated(mas); ^~~~~~~~~~~~~~~~~~ lib/maple_tree.c:1214:6: note: Assuming 'requested' is not equal to 0 if (!requested) ^~~~~~~~~~ lib/maple_tree.c:1214:2: note: Taking false branch if (!requested) ^ lib/maple_tree.c:1217:2: note: Calling 'mas_set_alloc_req' mas_set_alloc_req(mas, 0); ^~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:582:12: note: Field 'alloc' is non-null, which participates in a condition later if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) { ^ lib/maple_tree.c:582:6: note: Left side of '||' is false if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) { ^ lib/maple_tree.c:582:22: note: Assuming the condition is true if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) { ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:582:2: note: Taking true branch if (!mas->alloc || ((unsigned long)mas->alloc & 0x1)) { ^ lib/maple_tree.c:583:8: note: 'count' is 0 if (!count) ^~~~~ lib/maple_tree.c:583:3: note: Taking true branch if (!count) ^ lib/maple_tree.c:584:4: note: Null pointer value stored to 'mas.alloc' mas->alloc = NULL; ^~~~~~~~~~~~~~~~~ lib/maple_tree.c:1217:2: note: Returning from 'mas_set_alloc_req' mas_set_alloc_req(mas, 0); ^~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:1218:6: note: Assuming 'allocated' is not equal to 0 if (!allocated || mas->alloc->node_count == MAPLE_ALLOC_SLOTS - 1) { ^~~~~~~~~~ lib/maple_tree.c:1218:6: note: Left side of '||' is false lib/maple_tree.c:1218:20: note: Access to field 'node_count' results in a dereference of a null pointer (loaded from field 'alloc') if (!allocated || mas->alloc->node_count == MAPLE_ALLOC_SLOTS - 1) { ^ ~~~~~ lib/maple_tree.c:1263:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(slots, 0, max_req * sizeof(unsigned long)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1263:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(slots, 0, max_req * sizeof(unsigned long)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ >> lib/maple_tree.c:1696:3: warning: Dereference of null pointer >> [clang-analyzer-core.NullDereference] rcu_assign_pointer(slots[offset], mas->node); ^ include/linux/rcupdate.h:455:3: note: expanded from macro 'rcu_assign_pointer' smp_store_release(&p, RCU_INITIALIZER((typeof(p))_r_a_p__v)); \ ^ include/asm-generic/barrier.h:190:2: note: expanded from macro 'smp_store_release' WRITE_ONCE(*p, v); \ ^ include/asm-generic/rwonce.h:61:2: note: expanded from macro 'WRITE_ONCE' __WRITE_ONCE(x, val); \ ^ include/asm-generic/rwonce.h:55:30: note: expanded from macro '__WRITE_ONCE' *(volatile typeof(x) *)&(x) = (val); \ ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking false branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4280:15: note: Field 'entry' is null if (!wr_mas->entry) ^ lib/maple_tree.c:4280:2: note: Taking true branch if (!wr_mas->entry) ^ lib/maple_tree.c:4284:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) { ^ lib/maple_tree.c:4284:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) { ^ lib/maple_tree.c:4284:30: note: Assuming the condition is false if (unlikely(!mas->index && mas->last == ULONG_MAX)) { ^ include/linux/compiler.h:78:42: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^ lib/maple_tree.c:4284:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) { ^ lib/maple_tree.c:4289:2: note: Calling 'mas_wr_modify' mas_wr_modify(wr_mas); ^~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4215:14: note: Field 'r_min' is equal to field 'index' if (wr_mas->r_min == mas->index && wr_mas->r_max == mas->last) { ^ lib/maple_tree.c:4215:6: note: Left side of '&&' is true if (wr_mas->r_min == mas->index && wr_mas->r_max == mas->last) { ^ lib/maple_tree.c:4215:37: note: Assuming field 'r_max' is not equal to field 'last' if (wr_mas->r_min == mas->index && wr_mas->r_max == mas->last) { ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4215:2: note: Taking false branch if (wr_mas->r_min == mas->index && wr_mas->r_max == mas->last) { ^ lib/maple_tree.c:4225:6: note: Assuming the condition is false if (mas->max == ULONG_MAX) ^~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4225:2: note: Taking false branch if (mas->max == ULONG_MAX) ^ lib/maple_tree.c:4229:2: note: Taking false branch if (unlikely(node_size >= node_slots)) ^ lib/maple_tree.c:4232:14: note: Field 'entry' is null if (wr_mas->entry && (wr_mas->node_end < node_slots - 1) && ^ lib/maple_tree.c:4232:20: note: Left side of '&&' is false if (wr_mas->entry && (wr_mas->node_end < node_slots - 1) && ^ lib/maple_tree.c:4239:6: note: Left side of '&&' is true if ((wr_mas->offset_end - mas->offset <= 1) && mas_wr_slot_store(wr_mas)) ^ lib/maple_tree.c:4239:49: note: Assuming the condition is false -- #define memmove(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:46:30: note: expanded from macro '__underlying_memmove' #define __underlying_memmove __builtin_memmove ^~~~~~~~~~~~~~~~~ lib/maple_tree.c:1752:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 memmove(b_node->gap + shift, b_node->gap, size); ^ include/linux/fortify-string.h:373:27: note: expanded from macro 'memmove' #define memmove(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:46:30: note: expanded from macro '__underlying_memmove' #define __underlying_memmove __builtin_memmove ^~~~~~~~~~~~~~~~~ lib/maple_tree.c:1920:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(b_node->slot + mab_start, slots + mas_start, sizeof(void *) * j); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1920:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(b_node->slot + mab_start, slots + mas_start, sizeof(void *) * j); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1923:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(b_node->gap + mab_start, gaps + mas_start, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1923:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(b_node->gap + mab_start, gaps + mas_start, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1986:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(slots, b_node->slot + mab_start, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:1986:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(slots, b_node->slot + mab_start, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ >> lib/maple_tree.c:2808:2: warning: Value stored to 'last' is never read >> [clang-analyzer-deadcode.DeadStores] last = next = mas->node; ^ ~~~~~~~~~~~~~~~~ lib/maple_tree.c:2808:2: note: Value stored to 'last' is never read last = next = mas->node; ^ ~~~~~~~~~~~~~~~~ >> lib/maple_tree.c:2809:2: warning: Value stored to 'prev_min' is never read >> [clang-analyzer-deadcode.DeadStores] prev_min = min = mas->min; ^ ~~~~~~~~~~~~~~ lib/maple_tree.c:2809:2: note: Value stored to 'prev_min' is never read prev_min = min = mas->min; ^ ~~~~~~~~~~~~~~ lib/maple_tree.c:2934:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(mast->bn, 0, sizeof(struct maple_big_node)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ lib/maple_tree.c:2934:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(mast->bn, 0, sizeof(struct maple_big_node)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ >> lib/maple_tree.c:3004:2: warning: Address of stack memory associated with >> local variable 'destroy' is still referred to by the stack variable 'mast' >> upon returning to the caller. This will be a dangling reference >> [clang-analyzer-core.StackAddressEscape] return mast->bn->b_end; ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking true branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4272:3: note: Calling 'mas_wr_spanning_store' mas_wr_spanning_store(wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3896:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3904:2: note: Taking false branch if (mas_is_err(mas)) ^ lib/maple_tree.c:3914:2: note: Taking true branch if (r_mas.last + 1) ^ lib/maple_tree.c:3925:15: note: Field 'entry' is null if (!wr_mas->entry) { ^ lib/maple_tree.c:3925:2: note: Taking true branch if (!wr_mas->entry) { ^ lib/maple_tree.c:3936:12: note: Field 'offset' is > field 'node_end' if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3936:2: note: Taking false branch if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3946:9: note: Calling 'mas_spanning_rebalance' return mas_spanning_rebalance(mas, &mast, height + 1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:6: note: Left side of '&&' is true if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2900:6: note: Assuming the condition is false unlikely(mast->bn->b_end <= mt_min_slots[mast->bn->type])) { ^ include/linux/compiler.h:78:22: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:2: note: Taking false branch if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2921:2: note: Loop condition is true. Entering loop body while (count--) { ^ lib/maple_tree.c:2939:3: note: Taking false branch if (mas_is_root_limits(mast->l)) ^ lib/maple_tree.c:2954:3: note: Taking false branch if (mast_sufficient(mast)) ^ lib/maple_tree.c:2957:3: note: Taking false branch if (mast_overflow(mast)) ^ lib/maple_tree.c:2961:3: note: Taking false branch if (mas_is_root_limits(mast->orig_l)) ^ lib/maple_tree.c:2965:3: note: Taking true branch if (!mast_sibling_rebalance_right(mast, true)) ^ lib/maple_tree.c:2966:4: note: Taking true branch if (!mast_cousin_rebalance_right(mast, true)) ^ lib/maple_tree.c:2967:5: note: Execution continues on line 2973 break; ^ lib/maple_tree.c:2978:6: note: 'middle' is null if (middle) ^~~~~~ lib/maple_tree.c:2978:2: note: Taking false branch if (middle) ^ lib/maple_tree.c:2981:6: note: 'right' is null if (right) ^~~~~ lib/maple_tree.c:2981:2: note: Taking false branch if (right) ^ lib/maple_tree.c:2984:2: note: Taking false branch if (mas_is_root_limits(mast->l)) { ^ lib/maple_tree.c:2991:2: note: Taking true branch if (!mte_dead_node(mast->orig_l->node)) ^ lib/maple_tree.c:3004:2: note: Address of stack memory associated with local variable 'destroy' is still referred to by the stack variable 'mast' upon returning to the caller. This will be a dangling reference return mast->bn->b_end; ^ >> lib/maple_tree.c:3004:2: warning: Address of stack memory associated with >> local variable 'free' is still referred to by the stack variable 'mast' upon >> returning to the caller. This will be a dangling reference >> [clang-analyzer-core.StackAddressEscape] return mast->bn->b_end; ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking true branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4272:3: note: Calling 'mas_wr_spanning_store' mas_wr_spanning_store(wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3896:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3904:2: note: Taking false branch if (mas_is_err(mas)) ^ lib/maple_tree.c:3914:2: note: Taking true branch if (r_mas.last + 1) ^ lib/maple_tree.c:3925:15: note: Field 'entry' is null if (!wr_mas->entry) { ^ lib/maple_tree.c:3925:2: note: Taking true branch if (!wr_mas->entry) { ^ lib/maple_tree.c:3936:12: note: Field 'offset' is > field 'node_end' if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3936:2: note: Taking false branch if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3946:9: note: Calling 'mas_spanning_rebalance' return mas_spanning_rebalance(mas, &mast, height + 1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:6: note: Left side of '&&' is true if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2900:6: note: Assuming the condition is false unlikely(mast->bn->b_end <= mt_min_slots[mast->bn->type])) { ^ include/linux/compiler.h:78:22: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:2: note: Taking false branch if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2921:2: note: Loop condition is true. Entering loop body while (count--) { ^ lib/maple_tree.c:2939:3: note: Taking false branch if (mas_is_root_limits(mast->l)) ^ lib/maple_tree.c:2954:3: note: Taking false branch if (mast_sufficient(mast)) ^ lib/maple_tree.c:2957:3: note: Taking false branch if (mast_overflow(mast)) ^ lib/maple_tree.c:2961:3: note: Taking false branch if (mas_is_root_limits(mast->orig_l)) ^ lib/maple_tree.c:2965:3: note: Taking true branch if (!mast_sibling_rebalance_right(mast, true)) ^ lib/maple_tree.c:2966:4: note: Taking true branch if (!mast_cousin_rebalance_right(mast, true)) ^ lib/maple_tree.c:2967:5: note: Execution continues on line 2973 break; ^ lib/maple_tree.c:2978:6: note: 'middle' is null if (middle) ^~~~~~ lib/maple_tree.c:2978:2: note: Taking false branch if (middle) ^ lib/maple_tree.c:2981:6: note: 'right' is null if (right) ^~~~~ lib/maple_tree.c:2981:2: note: Taking false branch if (right) ^ lib/maple_tree.c:2984:2: note: Taking false branch if (mas_is_root_limits(mast->l)) { ^ lib/maple_tree.c:2991:2: note: Taking true branch if (!mte_dead_node(mast->orig_l->node)) ^ lib/maple_tree.c:3004:2: note: Address of stack memory associated with local variable 'free' is still referred to by the stack variable 'mast' upon returning to the caller. This will be a dangling reference return mast->bn->b_end; ^ >> lib/maple_tree.c:3004:2: warning: Address of stack memory associated with >> local variable 'l_mas' is still referred to by the stack variable 'mast' >> upon returning to the caller. This will be a dangling reference >> [clang-analyzer-core.StackAddressEscape] return mast->bn->b_end; ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking true branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4272:3: note: Calling 'mas_wr_spanning_store' mas_wr_spanning_store(wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3896:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3904:2: note: Taking false branch if (mas_is_err(mas)) ^ lib/maple_tree.c:3914:2: note: Taking true branch if (r_mas.last + 1) ^ lib/maple_tree.c:3925:15: note: Field 'entry' is null if (!wr_mas->entry) { ^ lib/maple_tree.c:3925:2: note: Taking true branch if (!wr_mas->entry) { ^ lib/maple_tree.c:3936:12: note: Field 'offset' is > field 'node_end' if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3936:2: note: Taking false branch if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3946:9: note: Calling 'mas_spanning_rebalance' return mas_spanning_rebalance(mas, &mast, height + 1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:6: note: Left side of '&&' is true if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2900:6: note: Assuming the condition is false unlikely(mast->bn->b_end <= mt_min_slots[mast->bn->type])) { ^ include/linux/compiler.h:78:22: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:2: note: Taking false branch if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2921:2: note: Loop condition is true. Entering loop body while (count--) { ^ lib/maple_tree.c:2939:3: note: Taking false branch if (mas_is_root_limits(mast->l)) ^ lib/maple_tree.c:2954:3: note: Taking false branch if (mast_sufficient(mast)) ^ lib/maple_tree.c:2957:3: note: Taking false branch if (mast_overflow(mast)) ^ lib/maple_tree.c:2961:3: note: Taking false branch if (mas_is_root_limits(mast->orig_l)) ^ lib/maple_tree.c:2965:3: note: Taking true branch if (!mast_sibling_rebalance_right(mast, true)) ^ lib/maple_tree.c:2966:4: note: Taking true branch if (!mast_cousin_rebalance_right(mast, true)) ^ lib/maple_tree.c:2967:5: note: Execution continues on line 2973 break; ^ lib/maple_tree.c:2978:6: note: 'middle' is null if (middle) ^~~~~~ lib/maple_tree.c:2978:2: note: Taking false branch if (middle) ^ lib/maple_tree.c:2981:6: note: 'right' is null if (right) ^~~~~ lib/maple_tree.c:2981:2: note: Taking false branch if (right) ^ lib/maple_tree.c:2984:2: note: Taking false branch if (mas_is_root_limits(mast->l)) { ^ lib/maple_tree.c:2991:2: note: Taking true branch if (!mte_dead_node(mast->orig_l->node)) ^ lib/maple_tree.c:3004:2: note: Address of stack memory associated with local variable 'l_mas' is still referred to by the stack variable 'mast' upon returning to the caller. This will be a dangling reference return mast->bn->b_end; ^ >> lib/maple_tree.c:3004:2: warning: Address of stack memory associated with >> local variable 'm_mas' is still referred to by the stack variable 'mast' >> upon returning to the caller. This will be a dangling reference >> [clang-analyzer-core.StackAddressEscape] return mast->bn->b_end; ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking true branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4272:3: note: Calling 'mas_wr_spanning_store' mas_wr_spanning_store(wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3896:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3904:2: note: Taking false branch if (mas_is_err(mas)) ^ lib/maple_tree.c:3914:2: note: Taking true branch if (r_mas.last + 1) ^ lib/maple_tree.c:3925:15: note: Field 'entry' is null if (!wr_mas->entry) { ^ lib/maple_tree.c:3925:2: note: Taking true branch if (!wr_mas->entry) { ^ lib/maple_tree.c:3936:12: note: Field 'offset' is > field 'node_end' if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3936:2: note: Taking false branch if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3946:9: note: Calling 'mas_spanning_rebalance' return mas_spanning_rebalance(mas, &mast, height + 1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:6: note: Left side of '&&' is true if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2900:6: note: Assuming the condition is false unlikely(mast->bn->b_end <= mt_min_slots[mast->bn->type])) { ^ include/linux/compiler.h:78:22: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:2: note: Taking false branch if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2921:2: note: Loop condition is true. Entering loop body while (count--) { ^ lib/maple_tree.c:2939:3: note: Taking false branch if (mas_is_root_limits(mast->l)) ^ lib/maple_tree.c:2954:3: note: Taking false branch if (mast_sufficient(mast)) ^ lib/maple_tree.c:2957:3: note: Taking false branch if (mast_overflow(mast)) ^ lib/maple_tree.c:2961:3: note: Taking false branch if (mas_is_root_limits(mast->orig_l)) ^ lib/maple_tree.c:2965:3: note: Taking true branch if (!mast_sibling_rebalance_right(mast, true)) ^ lib/maple_tree.c:2966:4: note: Taking true branch if (!mast_cousin_rebalance_right(mast, true)) ^ lib/maple_tree.c:2967:5: note: Execution continues on line 2973 break; ^ lib/maple_tree.c:2978:6: note: 'middle' is null if (middle) ^~~~~~ lib/maple_tree.c:2978:2: note: Taking false branch if (middle) ^ lib/maple_tree.c:2981:6: note: 'right' is null if (right) ^~~~~ lib/maple_tree.c:2981:2: note: Taking false branch if (right) ^ lib/maple_tree.c:2984:2: note: Taking false branch if (mas_is_root_limits(mast->l)) { ^ lib/maple_tree.c:2991:2: note: Taking true branch if (!mte_dead_node(mast->orig_l->node)) ^ lib/maple_tree.c:3004:2: note: Address of stack memory associated with local variable 'm_mas' is still referred to by the stack variable 'mast' upon returning to the caller. This will be a dangling reference return mast->bn->b_end; ^ >> lib/maple_tree.c:3004:2: warning: Address of stack memory associated with >> local variable 'r_mas' is still referred to by the stack variable 'mast' >> upon returning to the caller. This will be a dangling reference >> [clang-analyzer-core.StackAddressEscape] return mast->bn->b_end; ^ lib/maple_tree.c:6225:10: note: Calling 'mas_erase' entry = mas_erase(&mas); ^~~~~~~~~~~~~~~ lib/maple_tree.c:5935:6: note: Left side of '||' is false if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5935:2: note: Taking false branch if (mas_is_none(mas) || mas_is_paused(mas)) ^ lib/maple_tree.c:5940:7: note: 'entry' is non-null if (!entry) ^~~~~ lib/maple_tree.c:5940:2: note: Taking false branch if (!entry) ^ lib/maple_tree.c:5947:2: note: Calling 'mas_wr_store_entry' mas_wr_store_entry(&wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:4265:7: note: Assuming field 'content' is null if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^~~~~~~~~~~~~~~ lib/maple_tree.c:4265:6: note: Left side of '||' is false if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4265:6: note: Left side of '||' is false lib/maple_tree.c:4265:2: note: Taking false branch if ((wr_mas->content = mas_start(mas)) || mas_is_none(mas) || ^ lib/maple_tree.c:4271:2: note: Taking true branch if (unlikely(!mas_wr_walk(wr_mas))) { ^ lib/maple_tree.c:4272:3: note: Calling 'mas_wr_spanning_store' mas_wr_spanning_store(wr_mas); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:3896:21: note: Field 'index' is 0 if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:15: note: Left side of '&&' is true if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3896:2: note: Taking false branch if (unlikely(!mas->index && mas->last == ULONG_MAX)) ^ lib/maple_tree.c:3904:2: note: Taking false branch if (mas_is_err(mas)) ^ lib/maple_tree.c:3914:2: note: Taking true branch if (r_mas.last + 1) ^ lib/maple_tree.c:3925:15: note: Field 'entry' is null if (!wr_mas->entry) { ^ lib/maple_tree.c:3925:2: note: Taking true branch if (!wr_mas->entry) { ^ lib/maple_tree.c:3936:12: note: Field 'offset' is > field 'node_end' if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3936:2: note: Taking false branch if (r_mas.offset <= r_wr_mas.node_end) ^ lib/maple_tree.c:3946:9: note: Calling 'mas_spanning_rebalance' return mas_spanning_rebalance(mas, &mast, height + 1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:6: note: Left side of '&&' is true if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2900:6: note: Assuming the condition is false unlikely(mast->bn->b_end <= mt_min_slots[mast->bn->type])) { ^ include/linux/compiler.h:78:22: note: expanded from macro 'unlikely' # define unlikely(x) __builtin_expect(!!(x), 0) ^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/maple_tree.c:2899:2: note: Taking false branch if (!mas_is_root_limits(mast->orig_l) && ^ lib/maple_tree.c:2921:2: note: Loop condition is true. Entering loop body while (count--) { ^ lib/maple_tree.c:2939:3: note: Taking false branch if (mas_is_root_limits(mast->l)) ^ lib/maple_tree.c:2954:3: note: Taking false branch if (mast_sufficient(mast)) ^ lib/maple_tree.c:2957:3: note: Taking false branch if (mast_overflow(mast)) ^ lib/maple_tree.c:2961:3: note: Taking false branch if (mas_is_root_limits(mast->orig_l)) ^ lib/maple_tree.c:2965:3: note: Taking true branch if (!mast_sibling_rebalance_right(mast, true)) ^ lib/maple_tree.c:2966:4: note: Taking true branch if (!mast_cousin_rebalance_right(mast, true)) ^ lib/maple_tree.c:2967:5: note: Execution continues on line 2973 -- ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4043:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(dst_slots + dst_offset, wr_mas->slots + wr_mas->offset_end, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4048:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(dst_pivots + dst_offset, wr_mas->pivots + wr_mas->offset_end, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4048:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(dst_pivots + dst_offset, wr_mas->pivots + wr_mas->offset_end, ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4061:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(wr_mas->node, newnode, sizeof(struct maple_node)); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4061:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(wr_mas->node, newnode, sizeof(struct maple_node)); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4248:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&b_node, 0, sizeof(struct maple_big_node)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ lib/maple_tree.c:4248:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&b_node, 0, sizeof(struct maple_big_node)); ^ include/linux/fortify-string.h:272:25: note: expanded from macro 'memset' #define memset(p, c, s) __fortify_memset_chk(p, c, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk' __underlying_memset(p, c, __fortify_size); \ ^~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset' #define __underlying_memset __builtin_memset ^~~~~~~~~~~~~~~~ >> lib/maple_tree.c:4890:5: warning: Value stored to 'count' is never read >> [clang-analyzer-deadcode.DeadStores] count = mt_slots[type]; ^ ~~~~~~~~~~~~~~ lib/maple_tree.c:4890:5: note: Value stored to 'count' is never read count = mt_slots[type]; ^ ~~~~~~~~~~~~~~ Suppressed 17 warnings (15 in non-user code, 2 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 58 warnings generated. Suppressed 58 warnings (48 in non-user code, 10 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 53 warnings generated. mm/util.c:63:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(buf, s, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:63:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(buf, s, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:109:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(buf, s, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:109:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(buf, s, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:131:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(p, src, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:131:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(p, src, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' #define __underlying_memcpy __builtin_memcpy ^~~~~~~~~~~~~~~~ mm/util.c:154:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(buf, s, len); ^ include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy' #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk' __underlying_##op(p, q, __fortify_size); \ ^~~~~~~~~~~~~~~~~ note: expanded from here include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy' vim +/node +326 lib/maple_tree.c c11c433e3be4e5 Liam R. Howlett 2022-04-26 323 c11c433e3be4e5 Liam R. Howlett 2022-04-26 324 static inline void mte_set_full(const struct maple_enode *node) c11c433e3be4e5 Liam R. Howlett 2022-04-26 325 { c11c433e3be4e5 Liam R. Howlett 2022-04-26 @326 node = (void *)((unsigned long)node & ~MAPLE_ENODE_NULL); c11c433e3be4e5 Liam R. Howlett 2022-04-26 327 } c11c433e3be4e5 Liam R. Howlett 2022-04-26 328 -- 0-DAY CI Kernel Test Service https://01.org/lkp _______________________________________________ kbuild mailing list -- [email protected] To unsubscribe send an email to [email protected]
