CC: [email protected]
CC: [email protected]
BCC: [email protected]
CC: [email protected]
TO: Arnd Bergmann <[email protected]>
CC: Masahiro Yamada <[email protected]>
CC: Alex Shi <[email protected]>
CC: Nick Desaulniers <[email protected]>
CC: Miguel Ojeda <[email protected]>
CC: Nathan Chancellor <[email protected]>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 
master
head:   672c0c5173427e6b3e2a9bbb7be51ceeec78093a
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date:   7 weeks ago
:::::: branch date: 19 hours ago
:::::: commit date: 7 weeks ago
config: riscv-randconfig-c006-20220427 
(https://download.01.org/0day-ci/archive/20220503/[email protected]/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 
1cddcfdc3c683b393df1a5c9063252eb60e52818)
reproduce (this is a W=1 build):
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install riscv cross compiling tool for clang build
        # apt-get install binutils-riscv64-linux-gnu
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
        git remote add linus 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv 
clang-analyzer 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <[email protected]>


clang-analyzer warnings: (new ones prefixed by >>)
   ^
   drivers/ata/libata-transport.c:371:2: note: expanded from macro 
'ata_link_linkspeed_attr'
           ata_link_show_linkspeed(field, format)                          \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/ata/libata-transport.c:367:9: note: expanded from macro 
'ata_link_show_linkspeed'
           return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
                  ^~~~~~~
   drivers/ata/libata-transport.c:375:1: warning: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   ata_link_linkspeed_attr(sata_spd_limit, fls);
   ^
   drivers/ata/libata-transport.c:371:2: note: expanded from macro 
'ata_link_linkspeed_attr'
           ata_link_show_linkspeed(field, format)                          \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/ata/libata-transport.c:367:9: note: expanded from macro 
'ata_link_show_linkspeed'
           return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
                  ^~~~~~~
   drivers/ata/libata-transport.c:375:1: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
   ata_link_linkspeed_attr(sata_spd_limit, fls);
   ^
   drivers/ata/libata-transport.c:371:2: note: expanded from macro 
'ata_link_linkspeed_attr'
           ata_link_show_linkspeed(field, format)                          \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/ata/libata-transport.c:367:9: note: expanded from macro 
'ata_link_show_linkspeed'
           return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
                  ^~~~~~~
   drivers/ata/libata-transport.c:376:1: warning: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   ata_link_linkspeed_attr(sata_spd, noop);
   ^
   drivers/ata/libata-transport.c:371:2: note: expanded from macro 
'ata_link_linkspeed_attr'
           ata_link_show_linkspeed(field, format)                          \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/ata/libata-transport.c:367:9: note: expanded from macro 
'ata_link_show_linkspeed'
           return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
                  ^~~~~~~
   drivers/ata/libata-transport.c:376:1: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
   ata_link_linkspeed_attr(sata_spd, noop);
   ^
   drivers/ata/libata-transport.c:371:2: note: expanded from macro 
'ata_link_linkspeed_attr'
           ata_link_show_linkspeed(field, format)                          \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/ata/libata-transport.c:367:9: note: expanded from macro 
'ata_link_show_linkspeed'
           return sprintf(buf, "%s\n", sata_spd_string(format(link->field))); \
                  ^~~~~~~
   drivers/ata/libata-transport.c:534:18: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           arg->written += sprintf(arg->buf + arg->written,
                           ^~~~~~~
   drivers/ata/libata-transport.c:534:18: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           arg->written += sprintf(arg->buf + arg->written,
                           ^~~~~~~
   Suppressed 47 warnings (47 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   Suppressed 45 warnings (44 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   drivers/mfd/madera-core.c:475:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&madera->pdata, dev_get_platdata(madera->dev),
                   ^~~~~~
   drivers/mfd/madera-core.c:475:3: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
                   memcpy(&madera->pdata, dev_get_platdata(madera->dev),
                   ^~~~~~
   Suppressed 44 warnings (44 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   Suppressed 45 warnings (45 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   drivers/mfd/tps6507x.c:77:2: warning: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&msg[1], src, bytes);
           ^~~~~~
   drivers/mfd/tps6507x.c:77:2: note: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
           memcpy(&msg[1], src, bytes);
           ^~~~~~
   Suppressed 44 warnings (44 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   110 warnings generated.
   drivers/net/bonding/bond_sysfs.c:50:11: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           res += sprintf(buf + res, "++more++ ");
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:50:11: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
                           res += sprintf(buf + res, "++more++ ");
                                  ^~~~~~~
>> drivers/net/bonding/bond_sysfs.c:53:10: warning: Call to function 'sprintf' 
>> is insecure as it does not provide bounding of the memory buffer or security 
>> checks introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   res += sprintf(buf + res, "%s ", bond->dev->name);
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:53:10: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
                   res += sprintf(buf + res, "%s ", bond->dev->name);
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:88:2: warning: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sscanf(buffer, "%16s", command); /* IFNAMSIZ*/
           ^~~~~~
   drivers/net/bonding/bond_sysfs.c:88:2: note: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11
           sscanf(buffer, "%16s", command); /* IFNAMSIZ*/
           ^~~~~~
   drivers/net/bonding/bond_sysfs.c:181:11: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           res += sprintf(buf + res, "++more++ ");
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:181:11: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
                           res += sprintf(buf + res, "++more++ ");
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:184:10: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   res += sprintf(buf + res, "%s ", slave->dev->name);
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:184:10: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
                   res += sprintf(buf + res, "%s ", slave->dev->name);
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:206:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, BOND_MODE(bond));
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:206:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, BOND_MODE(bond));
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:220:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.xmit_policy);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:220:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.xmit_policy);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:236:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.arp_validate);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:236:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.arp_validate);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:251:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:251:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:268:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.fail_over_mac);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:268:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.fail_over_mac);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:280:9: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", bond->params.arp_interval);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:280:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", bond->params.arp_interval);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:295:11: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           res += sprintf(buf + res, "%pI4 ",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:295:11: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
                           res += sprintf(buf + res, "%pI4 ",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:313:9: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", bond->params.missed_max);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:313:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", bond->params.missed_max);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:325:9: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", bond->params.downdelay * 
bond->params.miimon);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:325:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", bond->params.downdelay * 
bond->params.miimon);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:336:9: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", bond->params.updelay * 
bond->params.miimon);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:336:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", bond->params.updelay * 
bond->params.miimon);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:348:9: warning: Call to function 'sprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:348:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:364:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.lacp_active);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:364:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, 
bond->params.lacp_active);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:378:9: warning: Call to function 'sprintf' 
is insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s %d\n", val->string, bond->params.lacp_fast);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs.c:378:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           return sprintf(buf, "%s %d\n", val->string, bond->params.lacp_fast);
--
           ^~~~~~~
   fs/reiserfs/prints.c:669:3: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:669:3: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:689:2: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   fs/reiserfs/prints.c:689:2: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   fs/reiserfs/prints.c:702:3: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:702:3: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:708:2: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   fs/reiserfs/prints.c:708:2: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   fs/reiserfs/prints.c:713:2: warning: Value stored to 'h' is never read 
[clang-analyzer-deadcode.DeadStores]
           h = 0;
           ^   ~
   fs/reiserfs/prints.c:713:2: note: Value stored to 'h' is never read
           h = 0;
           ^   ~
   fs/reiserfs/prints.c:715:3: warning: Call to function 'sprintf' is insecure 
as it does not provide bounding of the memory buffer or security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:715:3: note: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(print_tb_buf + strlen(print_tb_buf),
                   ^~~~~~~
   fs/reiserfs/prints.c:722:2: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   fs/reiserfs/prints.c:722:2: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
           sprintf(print_tb_buf + strlen(print_tb_buf),
           ^~~~~~~
   Suppressed 44 warnings (44 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   46 warnings generated.
   drivers/mfd/88pm860x-core.c:596:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(status_buf, 0, INT_STATUS_NUM);
           ^~~~~~
   drivers/mfd/88pm860x-core.c:596:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(status_buf, 0, INT_STATUS_NUM);
           ^~~~~~
   drivers/mfd/88pm860x-core.c:604:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(status_buf, 0xFF, INT_STATUS_NUM);
                   ^~~~~~
   drivers/mfd/88pm860x-core.c:604:3: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
                   memset(status_buf, 0xFF, INT_STATUS_NUM);
                   ^~~~~~
   Suppressed 44 warnings (44 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   drivers/mfd/88pm860x-i2c.c:113:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(dest, msgbuf1, bytes);
           ^~~~~~
   drivers/mfd/88pm860x-i2c.c:113:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(dest, msgbuf1, bytes);
           ^~~~~~
   drivers/mfd/88pm860x-i2c.c:128:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&buf[1], src, bytes);
           ^~~~~~
   drivers/mfd/88pm860x-i2c.c:128:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(&buf[1], src, bytes);
           ^~~~~~
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   81 warnings generated.
   drivers/net/bonding/bond_sysfs_slave.c:31:10: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "active\n");
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:31:10: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "active\n");
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:33:10: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "backup\n");
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:33:10: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "backup\n");
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:35:10: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "UNKNOWN\n");
                          ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:35:10: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "UNKNOWN\n");
                          ^~~~~~~
>> drivers/net/bonding/bond_sysfs_slave.c:42:9: warning: Call to function 
>> 'sprintf' is insecure as it does not provide bounding of the memory buffer 
>> or security checks introduced in the C11 standard. Replace with analogous 
>> functions that support length arguments or provides boundary checks such as 
>> 'sprintf_s' in case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", bond_slave_link_status(slave->link));
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:42:9: note: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", bond_slave_link_status(slave->link));
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:48:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", slave->link_failure_count);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:48:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", slave->link_failure_count);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:54:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%*phC\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:54:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%*phC\n",
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:62:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%d\n", slave->queue_id);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:62:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%d\n", slave->queue_id);
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:73:11: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           return sprintf(buf, "%d\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:73:11: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                           return sprintf(buf, "%d\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:77:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:77:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:88:11: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           return sprintf(buf, "%u\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:88:11: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                           return sprintf(buf, "%u\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:92:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:92:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:103:11: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           return sprintf(buf, "%u\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:103:11: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                           return sprintf(buf, "%u\n",
                                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:107:9: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   drivers/net/bonding/bond_sysfs_slave.c:107:9: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "N/A\n");
                  ^~~~~~~
   Suppressed 68 warnings (68 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   18 warnings generated.
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   19 warnings generated.
   drivers/mtd/nand/raw/nand_toshiba.c:63:29: warning: The left operand of '&' 
is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
                           bitflips = ecc_status[i] & 
TOSHIBA_NAND_ECC_STATUS_MASK;
                                                    ^
   drivers/mtd/nand/raw/nand_toshiba.c:116:6: note: Assuming 'ret' is 0
           if (ret)
               ^~~
   drivers/mtd/nand/raw/nand_toshiba.c:116:2: note: Taking false branch
           if (ret)
           ^
   drivers/mtd/nand/raw/nand_toshiba.c:119:9: note: Calling 
'toshiba_nand_benand_eccstatus'
           return toshiba_nand_benand_eccstatus(chip);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/nand_toshiba.c:58:8: note: Calling 
'toshiba_nand_benand_read_eccstatus_op'
           ret = toshiba_nand_benand_read_eccstatus_op(chip, ecc_status);
                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/nand_toshiba.c:34:2: note: Taking true branch
           if (nand_has_exec_op(chip)) {
           ^
   drivers/mtd/nand/raw/nand_toshiba.c:39:9: note: '?' condition is true
                                       PSEC_TO_NSEC(sdr->tADL_min)),
--
           if (cs == 0 && ctrl->cs0_offsets)
                       ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:6: note: 'cs' is not equal to 0
           if (cs && offs_cs1)
               ^~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:6: note: Left side of '&&' is 
true
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:12: note: 'offs_cs1' is 0
           if (cs && offs_cs1)
                     ^~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:2: note: Taking false branch
           if (cs && offs_cs1)
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->block_sizes', which participates in a condition later
           return offs_cs0 + cs * ctrl->reg_spacing + cs_offs;
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->page_sizes', which participates in a condition later
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->max_page_size', which participates in a condition later
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2454:21: note: Returning from 
'brcmnand_cs_offset'
           u16 cfg_ext_offs = brcmnand_cs_offset(ctrl, host->cs,
                              ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2456:25: note: Calling 
'brcmnand_cs_offset'
           u16 acc_control_offs = brcmnand_cs_offset(ctrl, host->cs,
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:849:6: note: 'cs' is not equal to 0
           if (cs == 0 && ctrl->cs0_offsets)
               ^~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:849:14: note: Left side of '&&' is 
false
           if (cs == 0 && ctrl->cs0_offsets)
                       ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:6: note: 'cs' is not equal to 0
           if (cs && offs_cs1)
               ^~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:6: note: Left side of '&&' is 
true
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:12: note: 'offs_cs1' is 0
           if (cs && offs_cs1)
                     ^~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:854:2: note: Taking false branch
           if (cs && offs_cs1)
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->block_sizes', which participates in a condition later
           return offs_cs0 + cs * ctrl->reg_spacing + cs_offs;
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->page_sizes', which participates in a condition later
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:857:2: note: Returning without 
writing to 'ctrl->max_page_size', which participates in a condition later
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2456:25: note: Returning from 
'brcmnand_cs_offset'
           u16 acc_control_offs = brcmnand_cs_offset(ctrl, host->cs,
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2461:6: note: Assuming field 
'block_sizes' is null
           if (ctrl->block_sizes) {
               ^~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2461:2: note: Taking false branch
           if (ctrl->block_sizes) {
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2475:3: note: The value 244 is 
assigned to 'block_size'
                   block_size = ffs(cfg->block_size) - 
ffs(BRCMNAND_MIN_BLOCKSIZE);
                   
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2478:6: note: Assuming the 
condition is false
           if (cfg->block_size < BRCMNAND_MIN_BLOCKSIZE || 
(ctrl->max_block_size &&
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2478:6: note: Left side of '||' is 
false
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2478:51: note: Assuming field 
'max_block_size' is 0
           if (cfg->block_size < BRCMNAND_MIN_BLOCKSIZE || 
(ctrl->max_block_size &&
                                                            ^~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2478:72: note: Left side of '&&' is 
false
           if (cfg->block_size < BRCMNAND_MIN_BLOCKSIZE || 
(ctrl->max_block_size &&
                                                                                
 ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2485:6: note: Assuming field 
'page_sizes' is null
           if (ctrl->page_sizes) {
               ^~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2485:2: note: Taking false branch
           if (ctrl->page_sizes) {
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2502:6: note: Assuming field 
'page_size' is >= BRCMNAND_MIN_PAGESIZE
           if (cfg->page_size < BRCMNAND_MIN_PAGESIZE || (ctrl->max_page_size &&
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2502:6: note: Left side of '||' is 
false
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2502:49: note: Assuming field 
'max_page_size' is 0
           if (cfg->page_size < BRCMNAND_MIN_PAGESIZE || (ctrl->max_page_size &&
                                                          ^~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2502:69: note: Left side of '&&' is 
false
           if (cfg->page_size < BRCMNAND_MIN_PAGESIZE || (ctrl->max_page_size &&
                                                                              ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2508:6: note: Assuming the 
condition is false
           if (fls64(cfg->device_size) < fls64(BRCMNAND_MIN_DEVSIZE)) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2508:2: note: Taking false branch
           if (fls64(cfg->device_size) < fls64(BRCMNAND_MIN_DEVSIZE)) {
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2518:7: note: Assuming field 
'device_width' is not equal to 16
                   (!!(cfg->device_width == 16) << CFG_BUS_WIDTH_SHIFT) |
                       ^~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2520:6: note: Assuming 'cfg_offs' 
is equal to 'cfg_ext_offs'
           if (cfg_offs == cfg_ext_offs) {
               ^~~~~~~~~~~~~~~~~~~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2520:2: note: Taking true branch
           if (cfg_offs == cfg_ext_offs) {
           ^
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2522:22: note: The result of the 
left shift is undefined due to shifting '244' by '28', which is unrepresentable 
in the unsigned version of the return type 'int'
                          (block_size << CFG_BLK_SIZE_SHIFT);
                           ~~~~~~~~~~ ^
>> drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: warning: Call to function 
>> 'sprintf' is insecure as it does not provide bounding of the memory buffer 
>> or security checks introduced in the C11 standard. Replace with analogous 
>> functions that support length arguments or provides boundary checks such as 
>> 'sprintf_s' in case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           buf += sprintf(buf,
                  ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: note: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11
           buf += sprintf(buf,
                  ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, ", Hamming ECC");
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, ", Hamming ECC");
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: warning: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, ", BCH-%u", cfg->ecc_level);
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: note: Call to function 
'sprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, ", BCH-%u", cfg->ecc_level);
                   ^~~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(cfg, 0, sizeof(*cfg));
           ^~~~~~
   drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(cfg, 0, sizeof(*cfg));
           ^~~~~~
   Suppressed 32 warnings (32 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   55 warnings generated.
   fs/xfs/libxfs/xfs_dir2_node.c:341:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(bp->b_addr, 0, sizeof(struct xfs_dir3_free_hdr));
           ^~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:341:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(bp->b_addr, 0, sizeof(struct xfs_dir3_free_hdr));
           ^~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:342:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:342:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&hdr, 0, sizeof(hdr));
           ^~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:873:43: warning: Access to field 'b_addr' 
results in a dereference of a null pointer (loaded from variable 'curbp') 
[clang-analyzer-core.NullDereference]
                   dep = (xfs_dir2_data_entry_t *)((char *)curbp->b_addr +
                                                           ^
   fs/xfs/libxfs/xfs_dir2_node.c:938:6: note: Assuming the condition is false
           if (args->op_flags & XFS_DA_OP_ADDNAME)
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:938:2: note: Taking false branch
           if (args->op_flags & XFS_DA_OP_ADDNAME)
           ^
   fs/xfs/libxfs/xfs_dir2_node.c:941:9: note: Calling 
'xfs_dir2_leafn_lookup_for_entry'
           return xfs_dir2_leafn_lookup_for_entry(bp, args, indexp, state);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:784:2: note: 'curbp' initialized to a null 
pointer value
           struct xfs_buf          *curbp = NULL;  /* current data/free buffer 
*/
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:805:6: note: Assuming field 'count' is > 0
           if (leafhdr.count <= 0) {
               ^~~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:805:2: note: Taking false branch
           if (leafhdr.count <= 0) {
           ^
   fs/xfs/libxfs/xfs_dir2_node.c:817:6: note: Assuming field 'extravalid' is 0
           if (state->extravalid) {
               ^~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:817:2: note: Taking false branch
           if (state->extravalid) {
           ^
   fs/xfs/libxfs/xfs_dir2_node.c:825:7: note: Assuming 'index' is < field 
'count'
                index < leafhdr.count && be32_to_cpu(lep->hashval) == 
args->hashval;
                ^~~~~~~~~~~~~~~~~~~~~
   fs/xfs/libxfs/xfs_dir2_node.c:825:7: note: Left side of '&&' is true
   fs/xfs/libxfs/xfs_dir2_node.c:825:32: note: '?' condition is false
                index < leafhdr.count && be32_to_cpu(lep->hashval) == 
args->hashval;
                                         ^
   include/linux/byteorder/generic.h:95:21: note: expanded from macro 
'be32_to_cpu'
   #define be32_to_cpu __be32_to_cpu
                       ^
   include/uapi/linux/byteorder/little_endian.h:41:26: note: expanded from 
macro '__be32_to_cpu'
   #define __be32_to_cpu(x) __swab32((__force __u32)(__be32)(x))
                            ^
   include/uapi/linux/swab.h:118:3: note: expanded from macro '__swab32'
           (__builtin_constant_p((__u32)(x)) ?     \
            ^
   fs/xfs/libxfs/xfs_dir2_node.c:825:32: note: Assuming the condition is true
                index < leafhdr.count && be32_to_cpu(lep->hashval) == 
args->hashval;
                                         ^
   include/linux/byteorder/generic.h:95:21: note: expanded from macro 
'be32_to_cpu'
   #define be32_to_cpu __be32_to_cpu
                       ^
   include/uapi/linux/byteorder/little_endian.h:41:26: note: expanded from 
macro '__be32_to_cpu'
   #define __be32_to_cpu(x) __swab32((__force __u32)(__be32)(x))
                            ^
   include/uapi/linux/swab.h:118:2: note: expanded from macro '__swab32'
           (__builtin_constant_p((__u32)(x)) ?     \
           ^
   fs/xfs/libxfs/xfs_dir2_node.c:824:2: note: Loop condition is true.  Entering 
loop body
--
           memmove(skb->data, skb->data + iv_len, header_length);
           ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:138:2: warning: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb->data + header_length, skbdesc->iv, iv_len);
           ^~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:138:2: note: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb->data + header_length, skbdesc->iv, iv_len);
           ^~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:194:3: warning: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:194:3: note: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:206:3: warning: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:206:3: note: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:213:2: warning: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb->data + transfer, rxdesc->iv, iv_len);
           ^~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:213:2: note: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb->data + transfer, rxdesc->iv, iv_len);
           ^~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:221:3: warning: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:221:3: note: Call to 
function 'memmove' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'memmove_s' in case of C11
                   memmove(skb->data + transfer,
                   ^~~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:239:2: warning: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(skb->data + transfer, &rxdesc->icv, 4);
           ^~~~~~
   drivers/net/wireless/ralink/rt2x00/rt2x00crypto.c:239:2: note: Call to 
function 'memcpy' is insecure as it does not provide security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(skb->data + transfer, &rxdesc->icv, 4);
           ^~~~~~
   Suppressed 74 warnings (74 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   45 warnings generated.
   drivers/input/misc/atmel_captouch.c:68:8: warning: Excessive padding in 
'struct atmel_captouch_device' (67 padding bytes, where 3 is optimal). 
   Optimal fields order: 
   xfer_buf, 
   client, 
   input, 
   num_btn, 
   keycodes, 
   prev_btn, 
   consider reordering the fields or adding explicit padding members 
[clang-analyzer-optin.performance.Padding]
   struct atmel_captouch_device {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~
   drivers/input/misc/atmel_captouch.c:68:8: note: Excessive padding in 'struct 
atmel_captouch_device' (67 padding bytes, where 3 is optimal). Optimal fields 
order: xfer_buf, client, input, num_btn, keycodes, prev_btn, consider 
reordering the fields or adding explicit padding members
   struct atmel_captouch_device {
   ~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~
   drivers/input/misc/atmel_captouch.c:118:2: warning: Call to function 
'memcpy' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(data, &capdev->xfer_buf[2], len);
           ^~~~~~
   drivers/input/misc/atmel_captouch.c:118:2: note: Call to function 'memcpy' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(data, &capdev->xfer_buf[2], len);
           ^~~~~~
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   43 warnings generated.
   Suppressed 43 warnings (43 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   32 warnings generated.
   drivers/input/misc/da9063_onkey.c:230:2: warning: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(onkey->phys, sizeof(onkey->phys), "%s/input0",
           ^~~~~~~~
   drivers/input/misc/da9063_onkey.c:230:2: note: Call to function 'snprintf' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(onkey->phys, sizeof(onkey->phys), "%s/input0",
           ^~~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: warning: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, 
bgmac->mii_bus->id,
                   ^~~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma.c:98:3: note: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
                   snprintf(bus_id, sizeof(bus_id), PHY_ID_FMT, 
bgmac->mii_bus->id,
                   ^~~~~~~~
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   65 warnings generated.
>> drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: warning: Call to 
>> function 'sprintf' is insecure as it does not provide bounding of the memory 
>> buffer or security checks introduced in the C11 standard. Replace with 
>> analogous functions that support length arguments or provides boundary 
>> checks such as 'sprintf_s' in case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   drivers/net/ethernet/broadcom/bgmac-bcma-mdio.c:225:2: note: Call to 
function 'sprintf' is insecure as it does not provide bounding of the memory 
buffer or security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sprintf_s' in case of C11
           sprintf(mii_bus->id, "%s-%d-%d", "bcma_mdio", core->bus->num,
           ^~~~~~~
   Suppressed 64 warnings (64 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   71 warnings generated.
   drivers/net/ethernet/calxeda/xgmac.c:425:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, sizeof(*p) * ring_size);
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:425:2: note: Call to function 'memset' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, sizeof(*p) * ring_size);
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:435:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(p, 0, sizeof(*p) * ring_size);
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:435:2: note: Call to function 'memset' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(p, 0, sizeof(*p) * ring_size);
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1018:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&priv->xstats, 0, sizeof(struct xgmac_extra_stats));
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1018:2: note: Call to function 'memset' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(&priv->xstats, 0, sizeof(struct xgmac_extra_stats));
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1288:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(hash_filter, 0, sizeof(hash_filter));
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1288:2: note: Call to function 'memset' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(hash_filter, 0, sizeof(hash_filter));
           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1626:4: warning: Call to function 
'memcpy' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(p, xgmac_gstrings_stats[i].stat_string,
                           ^~~~~~
   drivers/net/ethernet/calxeda/xgmac.c:1626:4: note: Call to function 'memcpy' 
is insecure as it does not provide security checks introduced in the C11 
standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(p, xgmac_gstrings_stats[i].stat_string,
                           ^~~~~~
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   41 warnings generated.
   drivers/usb/usbip/stub_main.c:36:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(busid_table, 0, sizeof(busid_table));
           ^~~~~~
   drivers/usb/usbip/stub_main.c:36:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(busid_table, 0, sizeof(busid_table));
           ^~~~~~
   drivers/usb/usbip/stub_main.c:136:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(busid_table[idx].name, 0, BUSID_SIZE);
                   ^~~~~~
   drivers/usb/usbip/stub_main.c:136:3: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
                   memset(busid_table[idx].name, 0, BUSID_SIZE);
                   ^~~~~~
   drivers/usb/usbip/stub_main.c:158:11: warning: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           out += sprintf(out, "%s ", busid_table[i].name);
                                  ^~~~~~~
   drivers/usb/usbip/stub_main.c:158:11: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
                           out += sprintf(out, "%s ", busid_table[i].name);
                                  ^~~~~~~
   drivers/usb/usbip/stub_main.c:162:9: warning: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           out += sprintf(out, "\n");
                  ^~~~~~~
   drivers/usb/usbip/stub_main.c:162:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           out += sprintf(out, "\n");
                  ^~~~~~~
   Suppressed 37 warnings (37 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   20 warnings generated.
   drivers/mtd/nftlmount.c:143:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(mh, buf, sizeof(struct NFTLMediaHeader));
                   ^~~~~~
   drivers/mtd/nftlmount.c:143:3: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
                   memcpy(mh, buf, sizeof(struct NFTLMediaHeader));
                   ^~~~~~
   drivers/mtd/nftlmount.c:323:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(instr, 0, sizeof(struct erase_info));
           ^~~~~~
   drivers/mtd/nftlmount.c:323:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(instr, 0, sizeof(struct erase_info));
           ^~~~~~
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   19 warnings generated.
   drivers/mtd/rfd_ftl.c:263:3: warning: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(buf, 0, SECTOR_SIZE);
                   ^~~~~~
   drivers/mtd/rfd_ftl.c:263:3: note: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(buf, 0, SECTOR_SIZE);
                   ^~~~~~
   Suppressed 18 warnings (18 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   40 warnings generated.
   drivers/mtd/sm_ftl.c:47:2: warning: Call to function 'strncpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'strncpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           strncpy(buf, sm_attr->data, sm_attr->len);
           ^~~~~~~
   drivers/mtd/sm_ftl.c:47:2: note: Call to function 'strncpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'strncpy_s' in case of C11
           strncpy(buf, sm_attr->data, sm_attr->len);
           ^~~~~~~
   drivers/mtd/sm_ftl.c:250:4: warning: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(buffer, 0xFF, SM_SECTOR_SIZE);
--
                   ^~~~~~
   Suppressed 94 warnings (94 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   89 warnings generated.
   Suppressed 89 warnings (89 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   35 warnings generated.
   drivers/iio/adc/ti-ads124s08.c:96:8: warning: Excessive padding in 'struct 
ads124s_private' (83 padding bytes, where 19 is optimal). 
   Optimal fields order: 
   data, 
   chip_info, 
   reset_gpio, 
   spi, 
   lock, 
   buffer, 
   consider reordering the fields or adding explicit padding members 
[clang-analyzer-optin.performance.Padding]
   struct ads124s_private {
   ~~~~~~~^~~~~~~~~~~~~~~~~
   drivers/iio/adc/ti-ads124s08.c:96:8: note: Excessive padding in 'struct 
ads124s_private' (83 padding bytes, where 19 is optimal). Optimal fields order: 
data, chip_info, reset_gpio, spi, lock, buffer, consider reordering the fields 
or adding explicit padding members
   struct ads124s_private {
   ~~~~~~~^~~~~~~~~~~~~~~~~
   drivers/iio/adc/ti-ads124s08.c:213:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&priv->data[1], ADS124S08_CMD_NOP, sizeof(priv->data) - 1);
           ^~~~~~
   drivers/iio/adc/ti-ads124s08.c:213:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&priv->data[1], ADS124S08_CMD_NOP, sizeof(priv->data) - 1);
           ^~~~~~
   Suppressed 33 warnings (33 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   46 warnings generated.
   drivers/iio/adc/ti-tlc4541.c:33:8: warning: Excessive padding in 'struct 
tlc4541_state' (72 padding bytes, where 8 is optimal). 
   Optimal fields order: 
   rx_buf, 
   spi, 
   reg, 
   scan_single_msg, 
   scan_single_xfer, 
   consider reordering the fields or adding explicit padding members 
[clang-analyzer-optin.performance.Padding]
   struct tlc4541_state {
   ~~~~~~~^~~~~~~~~~~~~~~
   drivers/iio/adc/ti-tlc4541.c:33:8: note: Excessive padding in 'struct 
tlc4541_state' (72 padding bytes, where 8 is optimal). Optimal fields order: 
rx_buf, spi, reg, scan_single_msg, scan_single_xfer, consider reordering the 
fields or adding explicit padding members
   struct tlc4541_state {
   ~~~~~~~^~~~~~~~~~~~~~~
   Suppressed 45 warnings (45 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   68 warnings generated.
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: warning: Value stored to 
'val' is never read [clang-analyzer-deadcode.DeadStores]
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:104:2: note: Value stored to 'val' 
is never read
           val = 0;
           ^     ~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   drivers/net/ethernet/freescale/fec_ptp.c:258:2: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(&fep->cc, 0, sizeof(fep->cc));
           ^~~~~~
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   drivers/net/ethernet/freescale/fsl_pq_mdio.c:444:2: warning: Call to 
function 'snprintf' is insecure as it does not provide security checks 
introduced in the C11 standard. Replace with analogous functions that support 
length arguments or provides boundary checks such as 'snprintf_s' in case of 
C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(new_bus->id, MII_BUS_ID_SIZE, "%pOFn@%llx", np,
           ^~~~~~~~
   drivers/net/ethernet/freescale/fsl_pq_mdio.c:444:2: note: Call to function 
'snprintf' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(new_bus->id, MII_BUS_ID_SIZE, "%pOFn@%llx", np,
           ^~~~~~~~
   Suppressed 66 warnings (66 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   84 warnings generated.
   drivers/net/ethernet/freescale/gianfar.c:1684:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1684:2: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(&edata, 0, sizeof(struct ethtool_eee));
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1694:2: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
           memset(fcb, 0, GMAC_FCB_LEN);
           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:1841:3: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
                   memset(skb->data, 0, GMAC_TXPAL_LEN);
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2210:4: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
                           memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: warning: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:2473:3: note: Call to function 
'memset' is insecure as it does not provide security checks introduced in the 
C11 standard. Replace with analogous functions that support length arguments or 
provides boundary checks such as 'memset_s' in case of C11
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^~~~~~
>> drivers/net/ethernet/freescale/gianfar.c:3325:4: warning: Call to function 
>> 'sprintf' is insecure as it does not provide bounding of the memory buffer 
>> or security checks introduced in the C11 standard. Replace with analogous 
>> functions that support length arguments or provides boundary checks such as 
>> 'sprintf_s' in case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3325:4: note: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, TX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: warning: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3327:4: note: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, RX)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: warning: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3329:4: note: Call to function 
'sprintf' is insecure as it does not provide bounding of the memory buffer or 
security checks introduced in the C11 standard. Replace with analogous 
functions that support length arguments or provides boundary checks such as 
'sprintf_s' in case of C11
                           sprintf(gfar_irq(grp, ER)->name, "%s%s%c%s",
                           ^~~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: warning: Call to function 
'strcpy' is insecure as it does not provide bounding of the memory buffer. 
Replace unbounded copy functions with analogous functions that support length 
arguments such as 'strlcpy'. CWE-119 
[clang-analyzer-security.insecureAPI.strcpy]
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   drivers/net/ethernet/freescale/gianfar.c:3332:4: note: Call to function 
'strcpy' is insecure as it does not provide bounding of the memory buffer. 
Replace unbounded copy functions with analogous functions that support length 
arguments such as 'strlcpy'. CWE-119
                           strcpy(gfar_irq(grp, TX)->name, dev->name);
                           ^~~~~~
   Suppressed 75 warnings (75 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   31 warnings generated.
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   27 warnings generated.
   Suppressed 27 warnings (27 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   32 warnings generated.
   sound/core/seq/seq_prioq.c:292:16: warning: Access to field 'next' results 
in a dereference of a null pointer (loaded from variable 'prev') 
[clang-analyzer-core.NullDereference]
                                   prev->next = cell->next;
                                   ~~~~       ^
   sound/core/seq/seq_prioq.c:279:2: note: 'prev' initialized to a null pointer 
value
           struct snd_seq_event_cell *prev = NULL;
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   sound/core/seq/seq_prioq.c:283:2: note: Loop condition is false.  Exiting 
loop
           spin_lock_irqsave(&f->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:264:3: note: expanded from macro 
'raw_spin_lock_irqsave'
                   _raw_spin_lock_irqsave(lock, flags);    \
                   ^
   include/linux/spinlock_api_up.h:69:45: note: expanded from macro 
'_raw_spin_lock_irqsave'
   #define _raw_spin_lock_irqsave(lock, flags)     __LOCK_IRQSAVE(lock, flags)
                                                   ^
   include/linux/spinlock_api_up.h:40:8: note: expanded from macro 
'__LOCK_IRQSAVE'
     do { local_irq_save(flags); __LOCK(lock); } while (0)
          ^
   include/linux/irqflags.h:244:36: note: expanded from macro 'local_irq_save'
   #define local_irq_save(flags)   do { raw_local_irq_save(flags); } while (0)
                                        ^
   include/linux/irqflags.h:176:2: note: expanded from macro 
'raw_local_irq_save'
           do {                                            \
           ^
   sound/core/seq/seq_prioq.c:283:2: note: Loop condition is false.  Exiting 
loop
           spin_lock_irqsave(&f->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:264:3: note: expanded from macro 
'raw_spin_lock_irqsave'
                   _raw_spin_lock_irqsave(lock, flags);    \
                   ^
   include/linux/spinlock_api_up.h:69:45: note: expanded from macro 
'_raw_spin_lock_irqsave'
   #define _raw_spin_lock_irqsave(lock, flags)     __LOCK_IRQSAVE(lock, flags)
                                                   ^
   include/linux/spinlock_api_up.h:40:8: note: expanded from macro 
'__LOCK_IRQSAVE'
     do { local_irq_save(flags); __LOCK(lock); } while (0)
          ^
   include/linux/irqflags.h:244:31: note: expanded from macro 'local_irq_save'
   #define local_irq_save(flags)   do { raw_local_irq_save(flags); } while (0)
                                   ^
   sound/core/seq/seq_prioq.c:283:2: note: Loop condition is false.  Exiting 
loop
           spin_lock_irqsave(&f->lock, flags);
           ^
   include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
           raw_spin_lock_irqsave(spinlock_check(lock), flags);     \
           ^
   include/linux/spinlock.h:264:3: note: expanded from macro 
'raw_spin_lock_irqsave'
                   _raw_spin_lock_irqsave(lock, flags);    \
                   ^
   include/linux/spinlock_api_up.h:69:45: note: expanded from macro 
'_raw_spin_lock_irqsave'
   #define _raw_spin_lock_irqsave(lock, flags)     __LOCK_IRQSAVE(lock, flags)
                                                   ^
   include/linux/spinlock_api_up.h:40:31: note: expanded from macro 
'__LOCK_IRQSAVE'
     do { local_irq_save(flags); __LOCK(lock); } while (0)
                                 ^
   include/linux/spinlock_api_up.h:31:27: note: expanded from macro '__LOCK'
     do { preempt_disable(); ___LOCK(lock); } while (0)
                             ^
   include/linux/spinlock_api_up.h:28:3: note: expanded from macro '___LOCK'
     do { __acquire(lock); (void)(lock); } while (0)
     ^
   sound/core/seq/seq_prioq.c:283:2: note: Loop condition is false.  Exiting 
loop
           spin_lock_irqsave(&f->lock, flags);

vim +53 drivers/net/bonding/bond_sysfs.c

b76cdba9cdb29b Mitch Williams      2005-11-09  30  
dc3e5d18f2a21f Nikolay Aleksandrov 2014-05-08  31  /* "show" function for the 
bond_masters attribute.
b76cdba9cdb29b Mitch Williams      2005-11-09  32   * The class parameter is 
ignored.
b76cdba9cdb29b Mitch Williams      2005-11-09  33   */
28812fe11a2182 Andi Kleen          2010-01-05  34  static ssize_t 
bonding_show_bonds(struct class *cls,
28812fe11a2182 Andi Kleen          2010-01-05  35                               
  struct class_attribute *attr,
28812fe11a2182 Andi Kleen          2010-01-05  36                               
  char *buf)
b76cdba9cdb29b Mitch Williams      2005-11-09  37  {
4c22400ab64d43 Eric W. Biederman   2011-10-12  38       struct bond_net *bn =
4c22400ab64d43 Eric W. Biederman   2011-10-12  39               
container_of(attr, struct bond_net, class_attr_bonding_masters);
b76cdba9cdb29b Mitch Williams      2005-11-09  40       int res = 0;
b76cdba9cdb29b Mitch Williams      2005-11-09  41       struct bonding *bond;
b76cdba9cdb29b Mitch Williams      2005-11-09  42  
7e0838404541d2 Stephen Hemminger   2009-06-12  43       rtnl_lock();
b76cdba9cdb29b Mitch Williams      2005-11-09  44  
ec87fd3b4e111e Eric W. Biederman   2009-10-29  45       
list_for_each_entry(bond, &bn->dev_list, bond_list) {
b76cdba9cdb29b Mitch Williams      2005-11-09  46               if (res > 
(PAGE_SIZE - IFNAMSIZ)) {
b76cdba9cdb29b Mitch Williams      2005-11-09  47                       /* not 
enough space for another interface name */
b76cdba9cdb29b Mitch Williams      2005-11-09  48                       if 
((PAGE_SIZE - res) > 10)
b76cdba9cdb29b Mitch Williams      2005-11-09  49                               
res = PAGE_SIZE - 10;
b88436651b612b Wagner Ferenc       2007-12-06 @50                       res += 
sprintf(buf + res, "++more++ ");
b76cdba9cdb29b Mitch Williams      2005-11-09  51                       break;
b76cdba9cdb29b Mitch Williams      2005-11-09  52               }
b88436651b612b Wagner Ferenc       2007-12-06 @53               res += 
sprintf(buf + res, "%s ", bond->dev->name);
b76cdba9cdb29b Mitch Williams      2005-11-09  54       }
1dcdcd69549c8e Wagner Ferenc       2007-12-06  55       if (res)
1dcdcd69549c8e Wagner Ferenc       2007-12-06  56               buf[res-1] = 
'\n'; /* eat the leftover space */
7e0838404541d2 Stephen Hemminger   2009-06-12  57  
7e0838404541d2 Stephen Hemminger   2009-06-12  58       rtnl_unlock();
b76cdba9cdb29b Mitch Williams      2005-11-09  59       return res;
b76cdba9cdb29b Mitch Williams      2005-11-09  60  }
b76cdba9cdb29b Mitch Williams      2005-11-09  61  

:::::: The code at line 53 was first introduced by commit
:::::: b88436651b612be8c29b169af832d80f00f94b7f bonding: Purely cosmetic: 
rename a local variable

:::::: TO: Wagner Ferenc <[email protected]>
:::::: CC: Jeff Garzik <[email protected]>

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to