:::::: 
:::::: Manual check reason: "low confidence static check first_new_problem: 
net/wireless/sysfs.c:46:9: warning: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]"
:::::: 

CC: l...@lists.linux.dev
CC: kbuild-...@lists.01.org
BCC: l...@intel.com
CC: linux-ker...@vger.kernel.org
TO: Arnd Bergmann <a...@arndb.de>
CC: Masahiro Yamada <masahi...@kernel.org>
CC: Alex Shi <al...@kernel.org>
CC: Nick Desaulniers <ndesaulni...@google.com>
CC: Miguel Ojeda <oj...@kernel.org>
CC: Nathan Chancellor <nat...@kernel.org>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 
master
head:   941e3e7912696b9fbe3586083a7c2e102cee7a87
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date:   4 months ago
:::::: branch date: 21 hours ago
:::::: commit date: 4 months ago
config: arm-randconfig-c002-20220627 
(https://download.01.org/0day-ci/archive/20220628/202206282216.q0hp15sa-...@intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 
016342e319fd31e41cf5ed16a6140a8ea2de74dd)
reproduce (this is a W=1 build):
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install arm cross compiling tool for clang build
        # apt-get install binutils-arm-linux-gnueabi
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
        git remote add linus 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm 
clang-analyzer 

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <l...@intel.com>


clang-analyzer warnings: (new ones prefixed by >>)
           ^~~~~~
   net/can/j1939/socket.c:572:2: note: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(addr, 0, J1939_MIN_NAMELEN);
           ^~~~~~
   net/can/j1939/socket.c:836:3: warning: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(msg->msg_name, 0, msg->msg_namelen);
                   ^~~~~~
   net/can/j1939/socket.c:836:3: note: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(msg->msg_name, 0, msg->msg_namelen);
                   ^~~~~~
   net/can/j1939/socket.c:882:2: warning: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(skcb, 0, sizeof(*skcb));
           ^~~~~~
   net/can/j1939/socket.c:882:2: note: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(skcb, 0, sizeof(*skcb));
           ^~~~~~
   net/can/j1939/socket.c:969:21: warning: Value stored to 'priv' during its 
initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct j1939_priv *priv = session->priv;
                              ^~~~   ~~~~~~~~~~~~~
   net/can/j1939/socket.c:969:21: note: Value stored to 'priv' during its 
initialization is never read
           struct j1939_priv *priv = session->priv;
                              ^~~~   ~~~~~~~~~~~~~
   net/can/j1939/socket.c:1013:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(serr, 0, sizeof(*serr));
           ^~~~~~
   net/can/j1939/socket.c:1013:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(serr, 0, sizeof(*serr));
           ^~~~~~
   Suppressed 86 warnings (85 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   70 warnings generated.
   net/8021q/vlan_dev.c:593:3: warning: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(dev->broadcast, real_dev->broadcast, dev->addr_len);
                   ^~~~~~
   net/8021q/vlan_dev.c:593:3: note: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
                   memcpy(dev->broadcast, real_dev->broadcast, dev->addr_len);
                   ^~~~~~
   Suppressed 69 warnings (69 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   65 warnings generated.
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   65 warnings generated.
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   66 warnings generated.
   Suppressed 66 warnings (65 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   67 warnings generated.
   net/wireless/core.c:104:2: warning: Call to function 'sscanf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sscanf(newname, PHY_NAME "%d%n", &wiphy_idx, &taken);
           ^~~~~~
   net/wireless/core.c:104:2: note: Call to function 'sscanf' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sscanf_s' in case of C11
           sscanf(newname, PHY_NAME "%d%n", &wiphy_idx, &taken);
           ^~~~~~
   net/wireless/core.c:800:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(wiphy->perm_addr, wiphy->addresses[0].addr, ETH_ALEN);
                   ^~~~~~
   net/wireless/core.c:800:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(wiphy->perm_addr, wiphy->addresses[0].addr, ETH_ALEN);
                   ^~~~~~
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   71 warnings generated.
   net/wireless/sysfs.c:36:1: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   SHOW_FMT(index, "%d", wiphy_idx);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
   net/wireless/sysfs.c:36:1: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
   SHOW_FMT(index, "%d", wiphy_idx);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
   net/wireless/sysfs.c:37:1: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   SHOW_FMT(macaddress, "%pM", wiphy.perm_addr);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
   net/wireless/sysfs.c:37:1: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
   SHOW_FMT(macaddress, "%pM", wiphy.perm_addr);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
   net/wireless/sysfs.c:38:1: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   SHOW_FMT(address_mask, "%pM", wiphy.addr_mask);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
   net/wireless/sysfs.c:38:1: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
   SHOW_FMT(address_mask, "%pM", wiphy.addr_mask);
   ^
   net/wireless/sysfs.c:32:9: note: expanded from macro 'SHOW_FMT'
           return sprintf(buf, fmt "\n", dev_to_rdev(dev)->member);        \
                  ^~~~~~~
>> net/wireless/sysfs.c:46:9: warning: Call to function 'sprintf' is insecure 
>> as it does not provide bounding of the memory buffer or security checks 
>> introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%s\n", wiphy_name(wiphy));
                  ^~~~~~~
   net/wireless/sysfs.c:46:9: note: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%s\n", wiphy_name(wiphy));
                  ^~~~~~~
   net/wireless/sysfs.c:59:10: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return sprintf(buf, "%pM\n", wiphy->perm_addr);
                          ^~~~~~~
   net/wireless/sysfs.c:59:10: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
                   return sprintf(buf, "%pM\n", wiphy->perm_addr);
                          ^~~~~~~
   net/wireless/sysfs.c:62:10: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   buf += sprintf(buf, "%pM\n", wiphy->addresses[i].addr);
                          ^~~~~~~
   net/wireless/sysfs.c:62:10: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
                   buf += sprintf(buf, "%pM\n", wiphy->addresses[i].addr);
                          ^~~~~~~
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   58 warnings generated.
   Suppressed 58 warnings (58 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   66 warnings generated.
   net/nfc/digital_technology.c:366:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(sel_req->nfcid1, sdd_res->nfcid1, 4);
           ^~~~~~
   net/nfc/digital_technology.c:366:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(sel_req->nfcid1, sdd_res->nfcid1, 4);
           ^~~~~~
   net/nfc/digital_technology.c:427:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(target->nfcid1 + target->nfcid1_len, sdd_res->nfcid1 + offset,
           ^~~~~~
   net/nfc/digital_technology.c:427:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(target->nfcid1 + target->nfcid1_len, sdd_res->nfcid1 + offset,
           ^~~~~~
   net/nfc/digital_technology.c:627:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(attrib_req->nfcid0, sensb_res->nfcid0,
           ^~~~~~
   net/nfc/digital_technology.c:627:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(attrib_req->nfcid0, sensb_res->nfcid0,
           ^~~~~~
   net/nfc/digital_technology.c:771:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&target, 0, sizeof(struct nfc_target));
           ^~~~~~
   net/nfc/digital_technology.c:771:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&target, 0, sizeof(struct nfc_target));
           ^~~~~~
   net/nfc/digital_technology.c:775:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(target.sensf_res, sensf_res, resp->len);
           ^~~~~~
   net/nfc/digital_technology.c:775:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(target.sensf_res, sensf_res, resp->len);
           ^~~~~~
   net/nfc/digital_technology.c:778:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(target.nfcid2, sensf_res->nfcid2, NFC_NFCID2_MAXSIZE);
           ^~~~~~
   net/nfc/digital_technology.c:778:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(target.nfcid2, sensf_res->nfcid2, NFC_NFCID2_MAXSIZE);
           ^~~~~~
   net/nfc/digital_technology.c:874:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(target->iso15693_uid, &res->uid, 
sizeof(target->iso15693_uid));
           ^~~~~~
   net/nfc/digital_technology.c:874:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(target->iso15693_uid, &res->uid, 
sizeof(target->iso15693_uid));
           ^~~~~~
   net/nfc/digital_technology.c:1142:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(sensf_res, 0, size);
           ^~~~~~
   net/nfc/digital_technology.c:1142:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(sensf_res, 0, size);
           ^~~~~~
   Suppressed 58 warnings (58 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   109 warnings generated.
   net/bluetooth/hci_event.c:291:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(hdev->adv_data, 0, sizeof(hdev->adv_data));
           ^~~~~~
   net/bluetooth/hci_event.c:291:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(hdev->adv_data, 0, sizeof(hdev->adv_data));
           ^~~~~~
   net/bluetooth/hci_event.c:294:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(hdev->scan_rsp_data, 0, sizeof(hdev->scan_rsp_data));
           ^~~~~~
   net/bluetooth/hci_event.c:294:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(hdev->scan_rsp_data, 0, sizeof(hdev->scan_rsp_data));
           ^~~~~~
   net/bluetooth/hci_event.c:362:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(hdev->dev_name, sent, HCI_MAX_NAME_LENGTH);
                   ^~~~~~
   net/bluetooth/hci_event.c:362:3: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
                   memcpy(hdev->dev_name, sent, HCI_MAX_NAME_LENGTH);
                   ^~~~~~
   net/bluetooth/hci_event.c:381:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(hdev->dev_name, rp->name, HCI_MAX_NAME_LENGTH);
                   ^~~~~~
   net/bluetooth/hci_event.c:381:3: note: Call to function 'memcpy' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11
                   memcpy(hdev->dev_name, rp->name, HCI_MAX_NAME_LENGTH);
                   ^~~~~~
   net/bluetooth/hci_event.c:517:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(hdev->dev_class, rp->dev_class, 3);
--
                   ^~~~~~
   net/ipv4/devinet.c:1159:5: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(ifa->ifa_label, ifr->ifr_name, 
IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1159:5: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                   memcpy(ifa->ifa_label, ifr->ifr_name, 
IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1161:5: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1161:5: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1268:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&ifr, 0, sizeof(struct ifreq));
                   ^~~~~~
   net/ipv4/devinet.c:1268:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(&ifr, 0, sizeof(struct ifreq));
                   ^~~~~~
   net/ipv4/devinet.c:1269:3: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(ifr.ifr_name, ifa->ifa_label);
                   ^~~~~~
   net/ipv4/devinet.c:1269:3: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
                   strcpy(ifr.ifr_name, ifa->ifa_label);
                   ^~~~~~
   net/ipv4/devinet.c:1488:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(old, ifa->ifa_label, IFNAMSIZ);
                   ^~~~~~
   net/ipv4/devinet.c:1488:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(old, ifa->ifa_label, IFNAMSIZ);
                   ^~~~~~
   net/ipv4/devinet.c:1489:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                   ^~~~~~
   net/ipv4/devinet.c:1489:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                   ^~~~~~
   net/ipv4/devinet.c:1494:4: warning: Call to function 'sprintf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           sprintf(old, ":%d", named);
                           ^~~~~~~
   net/ipv4/devinet.c:1494:4: note: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11
                           sprintf(old, ":%d", named);
                           ^~~~~~~
   net/ipv4/devinet.c:1498:4: warning: Call to function 'strcat' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcat(ifa->ifa_label, dot);
                           ^~~~~~
   net/ipv4/devinet.c:1498:4: note: Call to function 'strcat' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcat'. CWE-119
                           strcat(ifa->ifa_label, dot);
                           ^~~~~~
   net/ipv4/devinet.c:1500:4: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                           strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 
1), dot);
                           ^~~~~~
   net/ipv4/devinet.c:1500:4: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
                           strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 
1), dot);
                           ^~~~~~
   net/ipv4/devinet.c:1542:5: warning: Value stored to 'in_dev' is never read 
[clang-analyzer-deadcode.DeadStores]
                                   in_dev = inetdev_init(dev);
                                   ^        ~~~~~~~~~~~~~~~~~
   net/ipv4/devinet.c:1542:5: note: Value stored to 'in_dev' is never read
                                   in_dev = inetdev_init(dev);
                                   ^        ~~~~~~~~~~~~~~~~~
   net/ipv4/devinet.c:1567:5: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:1567:5: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                   memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
                                   ^~~~~~
   net/ipv4/devinet.c:2683:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(all, 
current->nsproxy->net_ns->ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2683:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(all, 
current->nsproxy->net_ns->ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2685:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2685:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2691:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(all, init_net.ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2691:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(all, init_net.ipv4.devconf_all,
                           ^~~~~~
   net/ipv4/devinet.c:2693:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(dflt, init_net.ipv4.devconf_dflt,
                           ^~~~~~
   net/ipv4/devinet.c:2693:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(dflt, init_net.ipv4.devconf_dflt,
                           ^~~~~~
   Suppressed 90 warnings (89 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   94 warnings generated.
   net/batman-adv/multicast.c:255:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&mla_flags, 0, sizeof(mla_flags));
           ^~~~~~
   net/batman-adv/multicast.c:255:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(&mla_flags, 0, sizeof(mla_flags));
           ^~~~~~
>> net/batman-adv/multicast.c:811:2: warning: Call to function 'sprintf' is 
>> insecure as it does not provide bounding of the memory buffer or security 
>> checks introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(str_old_flags, "[%c%c%c%s%s]",
           ^~~~~~~
   net/batman-adv/multicast.c:811:2: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
           sprintf(str_old_flags, "[%c%c%c%s%s]",
           ^~~~~~~
   net/batman-adv/multicast.c:849:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(mcast_data.reserved, 0, sizeof(mcast_data.reserved));
           ^~~~~~
   net/batman-adv/multicast.c:849:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(mcast_data.reserved, 0, sizeof(mcast_data.reserved));
           ^~~~~~
   Suppressed 91 warnings (90 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   73 warnings generated.
   net/batman-adv/netlink.c:1218:32: warning: Access to field 'soft_iface' 
results in a dereference of a null pointer (loaded from variable 'bat_priv') 
[clang-analyzer-core.NullDereference]
           if (hard_iface->soft_iface != bat_priv->soft_iface)
                                         ^
   net/batman-adv/netlink.c:1275:2: note: 'bat_priv' initialized to a null 
pointer value
           struct batadv_priv *bat_priv = NULL;
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/netlink.c:1283:14: note: '?' condition is false
           if (WARN_ON(hweight8(ops->internal_flags & user_ptr1_flags) > 1))
                       ^
   include/asm-generic/bitops/const_hweight.h:26:23: note: expanded from macro 
'hweight8'
   #define hweight8(w)  (__builtin_constant_p(w) ? __const_hweight8(w)  : 
__arch_hweight8(w))
                         ^
   net/batman-adv/netlink.c:1283:14: note: Assuming the condition is false
           if (WARN_ON(hweight8(ops->internal_flags & user_ptr1_flags) > 1))
                       ^
   include/asm-generic/bitops/const_hweight.h:26:22: note: expanded from macro 
'hweight8'
   #define hweight8(w)  (__builtin_constant_p(w) ? __const_hweight8(w)  : 
__arch_hweight8(w))
                        ^
   include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
           int __ret_warn_on = !!(condition);                              \
                                  ^~~~~~~~~
   net/batman-adv/netlink.c:1283:2: note: Taking false branch
           if (WARN_ON(hweight8(ops->internal_flags & user_ptr1_flags) > 1))
           ^
   net/batman-adv/netlink.c:1287:15: note: Assuming the condition is false
           if (WARN_ON((ops->internal_flags & mesh_dep_flags) &&
                        ^
   include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
           int __ret_warn_on = !!(condition);                              \
                                  ^~~~~~~~~
   net/batman-adv/netlink.c:1287:53: note: Left side of '&&' is false
           if (WARN_ON((ops->internal_flags & mesh_dep_flags) &&
                                                              ^
   net/batman-adv/netlink.c:1287:2: note: Taking false branch
           if (WARN_ON((ops->internal_flags & mesh_dep_flags) &&
           ^
   net/batman-adv/netlink.c:1291:6: note: Assuming the condition is false
           if (ops->internal_flags & BATADV_FLAG_NEED_MESH) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/netlink.c:1291:2: note: Taking false branch
           if (ops->internal_flags & BATADV_FLAG_NEED_MESH) {
           ^
   net/batman-adv/netlink.c:1300:6: note: Assuming the condition is true
           if (ops->internal_flags & BATADV_FLAG_NEED_HARDIF) {
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/netlink.c:1300:2: note: Taking true branch
           if (ops->internal_flags & BATADV_FLAG_NEED_HARDIF) {
           ^
   net/batman-adv/netlink.c:1301:44: note: Passing null pointer value via 1st 
parameter 'bat_priv'
                   hard_iface = batadv_get_hardif_from_info(bat_priv, net, 
info);
                                                            ^~~~~~~~
   net/batman-adv/netlink.c:1301:16: note: Calling 'batadv_get_hardif_from_info'
                   hard_iface = batadv_get_hardif_from_info(bat_priv, net, 
info);
                                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/netlink.c:1205:6: note: Assuming the condition is false
           if (!info->attrs[BATADV_ATTR_HARD_IFINDEX])
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/batman-adv/netlink.c:1205:2: note: Taking false branch
           if (!info->attrs[BATADV_ATTR_HARD_IFINDEX])
           ^
   net/batman-adv/netlink.c:1211:6: note: Assuming 'hard_dev' is non-null
           if (!hard_dev)
               ^~~~~~~~~
   net/batman-adv/netlink.c:1211:2: note: Taking false branch
           if (!hard_dev)
           ^
   net/batman-adv/netlink.c:1215:6: note: Assuming 'hard_iface' is non-null
           if (!hard_iface)
               ^~~~~~~~~~~
   net/batman-adv/netlink.c:1215:2: note: Taking false branch
           if (!hard_iface)
           ^
   net/batman-adv/netlink.c:1218:32: note: Access to field 'soft_iface' results 
in a dereference of a null pointer (loaded from variable 'bat_priv')
           if (hard_iface->soft_iface != bat_priv->soft_iface)
                                         ^~~~~~~~
   Suppressed 72 warnings (72 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   71 warnings generated.
   Suppressed 71 warnings (71 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   134 warnings generated.
   net/core/skbuff.c:210:2: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(shinfo, 0, offsetof(struct skb_shared_info, dataref));
           ^~~~~~
   net/core/skbuff.c:210:2: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(shinfo, 0, offsetof(struct skb_shared_info, dataref));
--
           ^~~~~~
   net/openvswitch/flow_netlink.c:2510:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(attrs, 0, sizeof(attrs));
           ^~~~~~
   net/openvswitch/flow_netlink.c:2595:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(match, 0, sizeof(*match));
           ^~~~~~
   net/openvswitch/flow_netlink.c:2595:2: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
           memset(match, 0, sizeof(*match));
           ^~~~~~
   net/openvswitch/flow_netlink.c:2600:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(key, 0, sizeof(*key));
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2600:3: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
                   memset(key, 0, sizeof(*key));
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2603:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&mask->key, 0, sizeof(mask->key));
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2603:3: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
                   memset(&mask->key, 0, sizeof(mask->key));
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2902:3: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(nla_data(at), nla_data(ovs_key), key_len); /* Key. */
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2902:3: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
                   memcpy(nla_data(at), nla_data(ovs_key), key_len); /* Key. */
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2903:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(nla_data(at) + key_len, 0xff, key_len);    /* Mask. */
                   ^~~~~~
   net/openvswitch/flow_netlink.c:2903:3: note: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11
                   memset(nla_data(at) + key_len, 0xff, key_len);    /* Mask. */
                   ^~~~~~
   net/openvswitch/flow_netlink.c:3031:2: warning: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(to, from, totlen);
           ^~~~~~
   net/openvswitch/flow_netlink.c:3031:2: note: Call to function 'memcpy' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memcpy_s' in case of C11
           memcpy(to, from, totlen);
           ^~~~~~
   Suppressed 103 warnings (102 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   80 warnings generated.
   Suppressed 80 warnings (79 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   91 warnings generated.
   net/ipv4/inet_fragment.c:547:5: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memset(&fp->rbnode, 0, sizeof(fp->rbnode));
                                   ^~~~~~
   net/ipv4/inet_fragment.c:547:5: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                                   memset(&fp->rbnode, 0, sizeof(fp->rbnode));
                                   ^~~~~~
   net/ipv4/inet_fragment.c:591:2: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&head->rbnode, 0, sizeof(head->rbnode));
           ^~~~~~
   net/ipv4/inet_fragment.c:591:2: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
           memset(&head->rbnode, 0, sizeof(head->rbnode));
           ^~~~~~
   Suppressed 89 warnings (88 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   86 warnings generated.
   net/core/xdp.c:161:2: warning: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(xdp_rxq, 0, sizeof(*xdp_rxq));
           ^~~~~~
   net/core/xdp.c:161:2: note: Call to function 'memset' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(xdp_rxq, 0, sizeof(*xdp_rxq));
           ^~~~~~
   net/core/xdp.c:524:2: warning: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(xdpf, 0, sizeof(*xdpf));
           ^~~~~~
   net/core/xdp.c:524:2: note: Call to function 'memset' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(xdpf, 0, sizeof(*xdpf));
           ^~~~~~
   net/core/xdp.c:528:2: warning: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(addr, data_to_copy, totsize);
           ^~~~~~
   net/core/xdp.c:528:2: note: Call to function 'memcpy' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(addr, data_to_copy, totsize);
           ^~~~~~
   net/core/xdp.c:613:2: warning: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(skb, 0, offsetof(struct sk_buff, tail));
           ^~~~~~
   net/core/xdp.c:613:2: note: Call to function 'memset' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(skb, 0, offsetof(struct sk_buff, tail));
           ^~~~~~
   net/core/xdp.c:636:2: warning: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(addr, xdpf, totalsize);
           ^~~~~~
   net/core/xdp.c:636:2: note: Call to function 'memcpy' is insecure as it does 
not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(addr, xdpf, totalsize);
           ^~~~~~
   Suppressed 81 warnings (81 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   75 warnings generated.
   net/wireless/mlme.c:43:2: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&cr, 0, sizeof(cr));
           ^~~~~~
   net/wireless/mlme.c:43:2: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
           memset(&cr, 0, sizeof(cr));
           ^~~~~~
>> net/wireless/mlme.c:217:3: warning: Call to function 'sprintf' is insecure 
>> as it does not provide bounding of the memory buffer or security checks 
>> introduced in the C11 standard. Replace with analogous functions that 
>> support length arguments or provides boundary checks such as 'sprintf_s' in 
>> case of C11 
>> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
                   ^~~~~~~
   net/wireless/mlme.c:217:3: note: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
                   ^~~~~~~
   net/wireless/mlme.c:221:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&wrqu, 0, sizeof(wrqu));
                   ^~~~~~
   net/wireless/mlme.c:221:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(&wrqu, 0, sizeof(wrqu));
                   ^~~~~~
   net/wireless/mlme.c:286:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(ht_capa, 0, sizeof(*ht_capa));
                   ^~~~~~
   net/wireless/mlme.c:286:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(ht_capa, 0, sizeof(*ht_capa));
                   ^~~~~~
   net/wireless/mlme.c:303:3: warning: Call to function 'memset' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(vht_capa, 0, sizeof(*vht_capa));
                   ^~~~~~
   net/wireless/mlme.c:303:3: note: Call to function 'memset' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memset_s' in case of C11
                   memset(vht_capa, 0, sizeof(*vht_capa));
                   ^~~~~~
   net/wireless/mlme.c:426:2: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(bssid, wdev->current_bss->pub.bssid, ETH_ALEN);
           ^~~~~~
   net/wireless/mlme.c:426:2: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(bssid, wdev->current_bss->pub.bssid, ETH_ALEN);
           ^~~~~~
   net/wireless/mlme.c:578:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(nreg->match, match_data, match_len);
                   ^~~~~~
   net/wireless/mlme.c:578:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(nreg->match, match_data, match_len);
                   ^~~~~~
   net/wireless/mlme.c:929:2: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(&rdev->radar_chandef, chandef, sizeof(struct 
cfg80211_chan_def));
           ^~~~~~
   net/wireless/mlme.c:929:2: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(&rdev->radar_chandef, chandef, sizeof(struct 
cfg80211_chan_def));
           ^~~~~~
   net/wireless/mlme.c:957:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&rdev->cac_done_chandef, chandef,
                   ^~~~~~
   net/wireless/mlme.c:957:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(&rdev->cac_done_chandef, chandef,
                   ^~~~~~
   net/wireless/mlme.c:997:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&rdev->cac_done_chandef, chandef, sizeof(*chandef));
                   ^~~~~~
   net/wireless/mlme.c:997:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(&rdev->cac_done_chandef, chandef, sizeof(*chandef));
                   ^~~~~~
   Suppressed 65 warnings (65 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   122 warnings generated.
   net/wireless/scan.c:292:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(pos, tmp_new, tmp_new[1] + 2);
                   ^~~~~~
   net/wireless/scan.c:292:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(pos, tmp_new, tmp_new[1] + 2);
                   ^~~~~~
   net/wireless/scan.c:326:5: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(pos, tmp_old, tmp_old[1] + 2);
                                   ^~~~~~
   net/wireless/scan.c:326:5: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                   memcpy(pos, tmp_old, tmp_old[1] + 2);
                                   ^~~~~~
   net/wireless/scan.c:342:6: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           memcpy(pos, tmp, tmp[1] + 2);
                                           ^~~~~~
   net/wireless/scan.c:342:6: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                           memcpy(pos, tmp, tmp[1] + 2);
                                           ^~~~~~
   net/wireless/scan.c:346:6: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                           memcpy(pos, tmp_old, tmp_old[1] + 2);
                                           ^~~~~~
   net/wireless/scan.c:346:6: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                           memcpy(pos, tmp_old, tmp_old[1] + 2);
                                           ^~~~~~
   net/wireless/scan.c:351:5: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                                   memcpy(pos, tmp, tmp[1] + 2);
                                   ^~~~~~
   net/wireless/scan.c:351:5: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                                   memcpy(pos, tmp, tmp[1] + 2);
                                   ^~~~~~
   net/wireless/scan.c:370:4: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(pos, tmp_new, tmp_new[1] + 2);
                           ^~~~~~
   net/wireless/scan.c:370:4: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                           memcpy(pos, tmp_new, tmp_new[1] + 2);
                           ^~~~~~
   net/wireless/scan.c:540:2: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(entry->bssid, pos, ETH_ALEN);
           ^~~~~~
   net/wireless/scan.c:540:2: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(entry->bssid, pos, ETH_ALEN);
           ^~~~~~
   net/wireless/scan.c:544:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(&entry->short_ssid, pos,

vim +46 net/wireless/sysfs.c

ef15aac6073b27f Johannes Berg      2010-01-20  39  
cfd8e12f42746df Ben Greear         2010-10-11  40  static ssize_t 
name_show(struct device *dev,
cfd8e12f42746df Ben Greear         2010-10-11  41                        struct 
device_attribute *attr,
5ec71dd7f1b63da Johannes Berg      2017-01-04  42                        char 
*buf)
5ec71dd7f1b63da Johannes Berg      2017-01-04  43  {
cfd8e12f42746df Ben Greear         2010-10-11  44       struct wiphy *wiphy = 
&dev_to_rdev(dev)->wiphy;
5ec71dd7f1b63da Johannes Berg      2017-01-04  45  
5ec71dd7f1b63da Johannes Berg      2017-01-04 @46       return sprintf(buf, 
"%s\n", wiphy_name(wiphy));
cfd8e12f42746df Ben Greear         2010-10-11  47  }
f0bc99c84349ce8 Greg Kroah-Hartman 2013-07-24  48  static DEVICE_ATTR_RO(name);
cfd8e12f42746df Ben Greear         2010-10-11  49  

:::::: The code at line 46 was first introduced by commit
:::::: 5ec71dd7f1b63da20fefebabf1e66cb530b9eb4d cfg80211: sysfs: use 
wiphy_name()

:::::: TO: Johannes Berg <johannes.b...@intel.com>
:::::: CC: Johannes Berg <johannes.b...@intel.com>

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- kbuild@lists.01.org
To unsubscribe send an email to kbuild-le...@lists.01.org

Reply via email to