Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libseccomp-2.5.0/src/syscalls.c
Examining data/libseccomp-2.5.0/src/arch-x86.h
Examining data/libseccomp-2.5.0/src/arch-mips.h
Examining data/libseccomp-2.5.0/src/arch-riscv64.c
Examining data/libseccomp-2.5.0/src/arch.c
Examining data/libseccomp-2.5.0/src/hash.h
Examining data/libseccomp-2.5.0/src/arch-s390.h
Examining data/libseccomp-2.5.0/src/arch-parisc.c
Examining data/libseccomp-2.5.0/src/arch-aarch64.h
Examining data/libseccomp-2.5.0/src/arch-ppc64.c
Examining data/libseccomp-2.5.0/src/helper.c
Examining data/libseccomp-2.5.0/src/arch-ppc.c
Examining data/libseccomp-2.5.0/src/arch-aarch64.c
Examining data/libseccomp-2.5.0/src/arch-s390.c
Examining data/libseccomp-2.5.0/src/arch-x86.c
Examining data/libseccomp-2.5.0/src/arch-mips64.h
Examining data/libseccomp-2.5.0/src/arch-mips64n32.h
Examining data/libseccomp-2.5.0/src/arch.h
Examining data/libseccomp-2.5.0/src/arch-syscall-dump.c
Examining data/libseccomp-2.5.0/src/arch-syscall-check.c
Examining data/libseccomp-2.5.0/src/hash.c
Examining data/libseccomp-2.5.0/src/arch-x86_64.h
Examining data/libseccomp-2.5.0/src/gen_bpf.c
Examining data/libseccomp-2.5.0/src/syscalls.h
Examining data/libseccomp-2.5.0/src/arch-x86_64.c
Examining data/libseccomp-2.5.0/src/arch-parisc64.h
Examining data/libseccomp-2.5.0/src/arch-arm.h
Examining data/libseccomp-2.5.0/src/gen_bpf.h
Examining data/libseccomp-2.5.0/src/arch-s390x.h
Examining data/libseccomp-2.5.0/src/syscalls.perf.c
Examining data/libseccomp-2.5.0/src/arch-ppc.h
Examining data/libseccomp-2.5.0/src/arch-x32.h
Examining data/libseccomp-2.5.0/src/arch-ppc64.h
Examining data/libseccomp-2.5.0/src/arch-riscv64.h
Examining data/libseccomp-2.5.0/src/arch-parisc64.c
Examining data/libseccomp-2.5.0/src/gen_pfc.h
Examining data/libseccomp-2.5.0/src/gen_pfc.c
Examining data/libseccomp-2.5.0/src/helper.h
Examining data/libseccomp-2.5.0/src/arch-s390x.c
Examining data/libseccomp-2.5.0/src/arch-parisc.h
Examining data/libseccomp-2.5.0/src/api.c
Examining data/libseccomp-2.5.0/src/db.c
Examining data/libseccomp-2.5.0/src/db.h
Examining data/libseccomp-2.5.0/src/system.h
Examining data/libseccomp-2.5.0/src/system.c
Examining data/libseccomp-2.5.0/src/arch-arm.c
Examining data/libseccomp-2.5.0/src/arch-mips.c
Examining data/libseccomp-2.5.0/src/arch-mips64.c
Examining data/libseccomp-2.5.0/src/arch-mips64n32.c
Examining data/libseccomp-2.5.0/src/arch-x32.c
Examining data/libseccomp-2.5.0/tools/util.h
Examining data/libseccomp-2.5.0/tools/scmp_bpf_sim.c
Examining data/libseccomp-2.5.0/tools/util.c
Examining data/libseccomp-2.5.0/tools/scmp_bpf_disasm.c
Examining data/libseccomp-2.5.0/tools/scmp_sys_resolver.c
Examining data/libseccomp-2.5.0/tools/scmp_api_level.c
Examining data/libseccomp-2.5.0/tools/scmp_arch_detect.c
Examining data/libseccomp-2.5.0/tools/bpf.h
Examining data/libseccomp-2.5.0/tests/18-sim-basic_allowlist.c
Examining data/libseccomp-2.5.0/tests/32-live-tsync_allow.c
Examining data/libseccomp-2.5.0/tests/util.h
Examining data/libseccomp-2.5.0/tests/34-sim-basic_denylist.c
Examining data/libseccomp-2.5.0/tests/03-sim-basic_chains.c
Examining data/libseccomp-2.5.0/tests/29-sim-pseudo_syscall.c
Examining data/libseccomp-2.5.0/tests/36-sim-ipc_syscalls.c
Examining data/libseccomp-2.5.0/tests/26-sim-arch_all_be_basic.c
Examining data/libseccomp-2.5.0/tests/13-basic-attrs.c
Examining data/libseccomp-2.5.0/tests/07-sim-db_bug_looping.c
Examining data/libseccomp-2.5.0/tests/01-sim-allow.c
Examining data/libseccomp-2.5.0/tests/44-live-a2_order.c
Examining data/libseccomp-2.5.0/tests/15-basic-resolver.c
Examining data/libseccomp-2.5.0/tests/43-sim-a2_order.c
Examining data/libseccomp-2.5.0/tests/46-sim-kill_process.c
Examining data/libseccomp-2.5.0/tests/33-sim-socket_syscalls_be.c
Examining data/libseccomp-2.5.0/tests/52-basic-load.c
Examining data/libseccomp-2.5.0/tests/util.c
Examining data/libseccomp-2.5.0/tests/28-sim-arch_x86.c
Examining data/libseccomp-2.5.0/tests/41-sim-syscall_priority_arch.c
Examining data/libseccomp-2.5.0/tests/48-sim-32b_args.c
Examining data/libseccomp-2.5.0/tests/05-sim-long_jumps.c
Examining data/libseccomp-2.5.0/tests/27-sim-bpf_blk_state.c
Examining data/libseccomp-2.5.0/tests/47-live-kill_process.c
Examining data/libseccomp-2.5.0/tests/45-sim-chain_code_coverage.c
Examining data/libseccomp-2.5.0/tests/miniseq.c
Examining data/libseccomp-2.5.0/tests/56-basic-iterate_syscalls.c
Examining data/libseccomp-2.5.0/tests/19-sim-missing_syscalls.c
Examining data/libseccomp-2.5.0/tests/16-sim-arch_basic.c
Examining data/libseccomp-2.5.0/tests/17-sim-arch_merge.c
Examining data/libseccomp-2.5.0/tests/50-sim-hash_collision.c
Examining data/libseccomp-2.5.0/tests/08-sim-subtree_checks.c
Examining data/libseccomp-2.5.0/tests/58-live-tsync_notify.c
Examining data/libseccomp-2.5.0/tests/49-sim-64b_comparisons.c
Examining data/libseccomp-2.5.0/tests/42-sim-adv_chains.c
Examining data/libseccomp-2.5.0/tests/20-live-basic_die.c
Examining data/libseccomp-2.5.0/tests/14-sim-reset.c
Examining data/libseccomp-2.5.0/tests/09-sim-syscall_priority_pre.c
Examining data/libseccomp-2.5.0/tests/55-basic-pfc_binary_tree.c
Examining data/libseccomp-2.5.0/tests/31-basic-version_check.c
Examining data/libseccomp-2.5.0/tests/22-sim-basic_chains_array.c
Examining data/libseccomp-2.5.0/tests/23-sim-arch_all_le_basic.c
Examining data/libseccomp-2.5.0/tests/10-sim-syscall_priority_post.c
Examining data/libseccomp-2.5.0/tests/40-sim-log.c
Examining data/libseccomp-2.5.0/tests/21-live-basic_allow.c
Examining data/libseccomp-2.5.0/tests/54-live-binary_tree.c
Examining data/libseccomp-2.5.0/tests/24-live-arg_allow.c
Examining data/libseccomp-2.5.0/tests/39-basic-api_level.c
Examining data/libseccomp-2.5.0/tests/12-sim-basic_masked_ops.c
Examining data/libseccomp-2.5.0/tests/38-basic-pfc_coverage.c
Examining data/libseccomp-2.5.0/tests/35-sim-negative_one.c
Examining data/libseccomp-2.5.0/tests/25-sim-multilevel_chains_adv.c
Examining data/libseccomp-2.5.0/tests/30-sim-socket_syscalls.c
Examining data/libseccomp-2.5.0/tests/53-sim-binary_tree.c
Examining data/libseccomp-2.5.0/tests/02-sim-basic.c
Examining data/libseccomp-2.5.0/tests/37-sim-ipc_syscalls_be.c
Examining data/libseccomp-2.5.0/tests/57-basic-rawsysrc.c
Examining data/libseccomp-2.5.0/tests/11-basic-basic_errors.c
Examining data/libseccomp-2.5.0/tests/51-live-user_notification.c
Examining data/libseccomp-2.5.0/tests/04-sim-multilevel_chains.c
Examining data/libseccomp-2.5.0/tests/06-sim-actions.c
Examining data/libseccomp-2.5.0/include/seccomp-syscalls.h
Examining data/libseccomp-2.5.0/include/seccomp.h

FINAL RESULTS:

data/libseccomp-2.5.0/src/arch-syscall-check.c:58:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str_miss, arch_name);
data/libseccomp-2.5.0/tests/53-sim-binary_tree.c:67:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	{ SCMP_SYS(access), 21, 0, { 0, 0 } },
data/libseccomp-2.5.0/tests/54-live-binary_tree.c:38:11:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
	SCMP_SYS(syslog),
data/libseccomp-2.5.0/tools/scmp_bpf_disasm.c:315:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(_OP_FMT, bpf_decode_op(&bpf));
data/libseccomp-2.5.0/src/arch-syscall-dump.c:74:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "a:o:h")) > 0) {
data/libseccomp-2.5.0/tests/util.c:76:7:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		c = getopt_long(argc, argv, "bp",
data/libseccomp-2.5.0/tools/scmp_arch_detect.c:54:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "ht")) > 0) {
data/libseccomp-2.5.0/tools/scmp_bpf_disasm.c:476:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "a:dh")) > 0) {
data/libseccomp-2.5.0/tools/scmp_bpf_sim.c:249:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "a:f:hs:v0:1:2:3:4:5:")) > 0) {
data/libseccomp-2.5.0/tools/scmp_sys_resolver.c:60:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "a:ht")) > 0) {
data/libseccomp-2.5.0/src/arch-syscall-check.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_miss[256];
data/libseccomp-2.5.0/src/arch-syscall-dump.c:82:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			offset = atoi(optarg);
data/libseccomp-2.5.0/src/db.c:1005:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rule->args, chain, sizeof(*chain) * ARG_COUNT_MAX);
data/libseccomp-2.5.0/src/db.c:1026:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, sizeof(*dest));
data/libseccomp-2.5.0/src/gen_bpf.c:396:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&blk->blks[blk->blk_cnt++], instr, sizeof(*instr));
data/libseccomp-2.5.0/src/gen_bpf.c:424:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&blk->blks[0], instr, sizeof(*instr));
data/libseccomp-2.5.0/src/syscalls.perf.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str0[sizeof("tee")];
data/libseccomp-2.5.0/src/syscalls.perf.c:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str1[sizeof("stat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str2[sizeof("send")];
data/libseccomp-2.5.0/src/syscalls.perf.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str3[sizeof("time")];
data/libseccomp-2.5.0/src/syscalls.perf.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str4[sizeof("idle")];
data/libseccomp-2.5.0/src/syscalls.perf.c:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str5[sizeof("dup")];
data/libseccomp-2.5.0/src/syscalls.perf.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str6[sizeof("times")];
data/libseccomp-2.5.0/src/syscalls.perf.c:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str7[sizeof("statfs")];
data/libseccomp-2.5.0/src/syscalls.perf.c:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str8[sizeof("nice")];
data/libseccomp-2.5.0/src/syscalls.perf.c:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str9[sizeof("stime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str10[sizeof("ftime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str11[sizeof("utime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str12[sizeof("setsid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str13[sizeof("getsid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str14[sizeof("pipe")];
data/libseccomp-2.5.0/src/syscalls.perf.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str15[sizeof("gettid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str16[sizeof("utimes")];
data/libseccomp-2.5.0/src/syscalls.perf.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str17[sizeof("uname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str18[sizeof("getegid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str19[sizeof("geteuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str20[sizeof("pause")];
data/libseccomp-2.5.0/src/syscalls.perf.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str21[sizeof("getcpu")];
data/libseccomp-2.5.0/src/syscalls.perf.c:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str22[sizeof("setfsgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str23[sizeof("setregid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str24[sizeof("setfsuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str25[sizeof("setreuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str26[sizeof("getdents")];
data/libseccomp-2.5.0/src/syscalls.perf.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str27[sizeof("setns")];
data/libseccomp-2.5.0/src/syscalls.perf.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str28[sizeof("semctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str29[sizeof("ulimit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str30[sizeof("setresgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str31[sizeof("getresgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str32[sizeof("setresuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str33[sizeof("getresuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str34[sizeof("fsmount")];
data/libseccomp-2.5.0/src/syscalls.perf.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str35[sizeof("getrusage")];
data/libseccomp-2.5.0/src/syscalls.perf.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str36[sizeof("sendfile")];
data/libseccomp-2.5.0/src/syscalls.perf.c:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str37[sizeof("listen")];
data/libseccomp-2.5.0/src/syscalls.perf.c:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str38[sizeof("semop")];
data/libseccomp-2.5.0/src/syscalls.perf.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str39[sizeof("linkat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str40[sizeof("faccessat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str41[sizeof("fsconfig")];
data/libseccomp-2.5.0/src/syscalls.perf.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str42[sizeof("socket")];
data/libseccomp-2.5.0/src/syscalls.perf.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str43[sizeof("userfaultfd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str44[sizeof("utimensat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str45[sizeof("newfstatat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str46[sizeof("sigsuspend")];
data/libseccomp-2.5.0/src/syscalls.perf.c:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str47[sizeof("acct")];
data/libseccomp-2.5.0/src/syscalls.perf.c:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str48[sizeof("ipc")];
data/libseccomp-2.5.0/src/syscalls.perf.c:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str49[sizeof("select")];
data/libseccomp-2.5.0/src/syscalls.perf.c:194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str50[sizeof("tuxcall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str51[sizeof("ioctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str52[sizeof("oldstat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str53[sizeof("close")];
data/libseccomp-2.5.0/src/syscalls.perf.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str54[sizeof("access")];
data/libseccomp-2.5.0/src/syscalls.perf.c:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str55[sizeof("capset")];
data/libseccomp-2.5.0/src/syscalls.perf.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str56[sizeof("sendto")];
data/libseccomp-2.5.0/src/syscalls.perf.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str57[sizeof("oldfstat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str58[sizeof("usr26")];
data/libseccomp-2.5.0/src/syscalls.perf.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str59[sizeof("signal")];
data/libseccomp-2.5.0/src/syscalls.perf.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str60[sizeof("open")];
data/libseccomp-2.5.0/src/syscalls.perf.c:205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str61[sizeof("signalfd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str62[sizeof("fcntl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str63[sizeof("msgsnd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str64[sizeof("sendmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str65[sizeof("sethostname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str66[sizeof("accept")];
data/libseccomp-2.5.0/src/syscalls.perf.c:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str67[sizeof("io_setup")];
data/libseccomp-2.5.0/src/syscalls.perf.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str68[sizeof("openat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str69[sizeof("msgctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str70[sizeof("clone")];
data/libseccomp-2.5.0/src/syscalls.perf.c:215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str71[sizeof("fchmod")];
data/libseccomp-2.5.0/src/syscalls.perf.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str72[sizeof("nanosleep")];
data/libseccomp-2.5.0/src/syscalls.perf.c:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str73[sizeof("iopl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str74[sizeof("rtas")];
data/libseccomp-2.5.0/src/syscalls.perf.c:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str75[sizeof("setrlimit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str76[sizeof("getrlimit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str77[sizeof("poll")];
data/libseccomp-2.5.0/src/syscalls.perf.c:222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str78[sizeof("read")];
data/libseccomp-2.5.0/src/syscalls.perf.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str79[sizeof("oldolduname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str80[sizeof("ppoll")];
data/libseccomp-2.5.0/src/syscalls.perf.c:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str81[sizeof("munmap")];
data/libseccomp-2.5.0/src/syscalls.perf.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str82[sizeof("fchmodat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str83[sizeof("mount")];
data/libseccomp-2.5.0/src/syscalls.perf.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str84[sizeof("prof")];
data/libseccomp-2.5.0/src/syscalls.perf.c:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str85[sizeof("pidfd_getfd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str86[sizeof("oldlstat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str87[sizeof("fsync")];
data/libseccomp-2.5.0/src/syscalls.perf.c:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str88[sizeof("seccomp")];
data/libseccomp-2.5.0/src/syscalls.perf.c:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str89[sizeof("timerfd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str90[sizeof("pciconfig_read")];
data/libseccomp-2.5.0/src/syscalls.perf.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str91[sizeof("pciconfig_write")];
data/libseccomp-2.5.0/src/syscalls.perf.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str92[sizeof("pciconfig_iobase")];
data/libseccomp-2.5.0/src/syscalls.perf.c:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str93[sizeof("clone3")];
data/libseccomp-2.5.0/src/syscalls.perf.c:238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str94[sizeof("semtimedop")];
data/libseccomp-2.5.0/src/syscalls.perf.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str95[sizeof("setdomainname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str96[sizeof("alarm")];
data/libseccomp-2.5.0/src/syscalls.perf.c:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str97[sizeof("sendmmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str98[sizeof("rt_sigsuspend")];
data/libseccomp-2.5.0/src/syscalls.perf.c:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str99[sizeof("socketcall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str100[sizeof("pidfd_send_signal")];
data/libseccomp-2.5.0/src/syscalls.perf.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str101[sizeof("io_cancel")];
data/libseccomp-2.5.0/src/syscalls.perf.c:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str102[sizeof("unshare")];
data/libseccomp-2.5.0/src/syscalls.perf.c:247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str103[sizeof("prctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str104[sizeof("tgkill")];
data/libseccomp-2.5.0/src/syscalls.perf.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str105[sizeof("cachectl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str106[sizeof("mprotect")];
data/libseccomp-2.5.0/src/syscalls.perf.c:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str107[sizeof("sigreturn")];
data/libseccomp-2.5.0/src/syscalls.perf.c:252:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str108[sizeof("profil")];
data/libseccomp-2.5.0/src/syscalls.perf.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str109[sizeof("reboot")];
data/libseccomp-2.5.0/src/syscalls.perf.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str110[sizeof("_sysctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str111[sizeof("rt_sigpending")];
data/libseccomp-2.5.0/src/syscalls.perf.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str112[sizeof("link")];
data/libseccomp-2.5.0/src/syscalls.perf.c:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str113[sizeof("connect")];
data/libseccomp-2.5.0/src/syscalls.perf.c:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str114[sizeof("sched_get_priority_min")];
data/libseccomp-2.5.0/src/syscalls.perf.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str115[sizeof("ioprio_set")];
data/libseccomp-2.5.0/src/syscalls.perf.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str116[sizeof("ioprio_get")];
data/libseccomp-2.5.0/src/syscalls.perf.c:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str117[sizeof("pidfd_open")];
data/libseccomp-2.5.0/src/syscalls.perf.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str118[sizeof("keyctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str119[sizeof("dup2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str120[sizeof("fork")];
data/libseccomp-2.5.0/src/syscalls.perf.c:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str121[sizeof("splice")];
data/libseccomp-2.5.0/src/syscalls.perf.c:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str122[sizeof("fallocate")];
data/libseccomp-2.5.0/src/syscalls.perf.c:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str123[sizeof("msync")];
data/libseccomp-2.5.0/src/syscalls.perf.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str124[sizeof("pselect6")];
data/libseccomp-2.5.0/src/syscalls.perf.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str125[sizeof("lock")];
data/libseccomp-2.5.0/src/syscalls.perf.c:270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str126[sizeof("getrandom")];
data/libseccomp-2.5.0/src/syscalls.perf.c:271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str127[sizeof("migrate_pages")];
data/libseccomp-2.5.0/src/syscalls.perf.c:272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str128[sizeof("setresgid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str129[sizeof("getresgid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str130[sizeof("setresuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str131[sizeof("getresuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str132[sizeof("setuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str133[sizeof("getuid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:278:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str134[sizeof("delete_module")];
data/libseccomp-2.5.0/src/syscalls.perf.c:279:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str135[sizeof("sysfs")];
data/libseccomp-2.5.0/src/syscalls.perf.c:280:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str136[sizeof("socketpair")];
data/libseccomp-2.5.0/src/syscalls.perf.c:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str137[sizeof("faccessat2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str138[sizeof("syncfs")];
data/libseccomp-2.5.0/src/syscalls.perf.c:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str139[sizeof("futimesat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str140[sizeof("rt_sigaction")];
data/libseccomp-2.5.0/src/syscalls.perf.c:285:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str141[sizeof("rt_sigtimedwait")];
data/libseccomp-2.5.0/src/syscalls.perf.c:286:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str142[sizeof("init_module")];
data/libseccomp-2.5.0/src/syscalls.perf.c:287:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str143[sizeof("setfsgid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str144[sizeof("setregid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str145[sizeof("setfsuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str146[sizeof("setreuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str147[sizeof("kill")];
data/libseccomp-2.5.0/src/syscalls.perf.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str148[sizeof("move_pages")];
data/libseccomp-2.5.0/src/syscalls.perf.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str149[sizeof("sched_setparam")];
data/libseccomp-2.5.0/src/syscalls.perf.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str150[sizeof("sched_getparam")];
data/libseccomp-2.5.0/src/syscalls.perf.c:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str151[sizeof("truncate")];
data/libseccomp-2.5.0/src/syscalls.perf.c:296:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str152[sizeof("mknod")];
data/libseccomp-2.5.0/src/syscalls.perf.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str153[sizeof("mincore")];
data/libseccomp-2.5.0/src/syscalls.perf.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str154[sizeof("mremap")];
data/libseccomp-2.5.0/src/syscalls.perf.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str155[sizeof("ugetrlimit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str156[sizeof("lookup_dcookie")];
data/libseccomp-2.5.0/src/syscalls.perf.c:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str157[sizeof("timer_settime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str158[sizeof("timer_gettime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str159[sizeof("timerfd_settime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str160[sizeof("timerfd_gettime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str161[sizeof("eventfd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str162[sizeof("tkill")];
data/libseccomp-2.5.0/src/syscalls.perf.c:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str163[sizeof("stty")];
data/libseccomp-2.5.0/src/syscalls.perf.c:308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str164[sizeof("gtty")];
data/libseccomp-2.5.0/src/syscalls.perf.c:309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str165[sizeof("exit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str166[sizeof("getpid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str167[sizeof("dup3")];
data/libseccomp-2.5.0/src/syscalls.perf.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str168[sizeof("timer_getoverrun")];
data/libseccomp-2.5.0/src/syscalls.perf.c:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str169[sizeof("timer_delete")];
data/libseccomp-2.5.0/src/syscalls.perf.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str170[sizeof("sysmips")];
data/libseccomp-2.5.0/src/syscalls.perf.c:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str171[sizeof("setpgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str172[sizeof("getpgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str173[sizeof("copy_file_range")];
data/libseccomp-2.5.0/src/syscalls.perf.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str174[sizeof("mknodat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str175[sizeof("fsopen")];
data/libseccomp-2.5.0/src/syscalls.perf.c:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str176[sizeof("sync")];
data/libseccomp-2.5.0/src/syscalls.perf.c:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str177[sizeof("fstat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str178[sizeof("bind")];
data/libseccomp-2.5.0/src/syscalls.perf.c:323:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str179[sizeof("ustat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str180[sizeof("bpf")];
data/libseccomp-2.5.0/src/syscalls.perf.c:325:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str181[sizeof("getppid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:326:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str182[sizeof("epoll_ctl_old")];
data/libseccomp-2.5.0/src/syscalls.perf.c:327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str183[sizeof("syscall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str184[sizeof("lstat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str185[sizeof("fstatfs")];
data/libseccomp-2.5.0/src/syscalls.perf.c:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str186[sizeof("umount")];
data/libseccomp-2.5.0/src/syscalls.perf.c:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str187[sizeof("s390_guarded_storage")];
data/libseccomp-2.5.0/src/syscalls.perf.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str188[sizeof("epoll_ctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str189[sizeof("vm86")];
data/libseccomp-2.5.0/src/syscalls.perf.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str190[sizeof("rt_sigreturn")];
data/libseccomp-2.5.0/src/syscalls.perf.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str191[sizeof("getsockname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str192[sizeof("sched_setattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:337:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str193[sizeof("sched_getattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str194[sizeof("sigpending")];
data/libseccomp-2.5.0/src/syscalls.perf.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str195[sizeof("utimensat_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str196[sizeof("sched_setscheduler")];
data/libseccomp-2.5.0/src/syscalls.perf.c:341:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str197[sizeof("sched_getscheduler")];
data/libseccomp-2.5.0/src/syscalls.perf.c:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str198[sizeof("ioperm")];
data/libseccomp-2.5.0/src/syscalls.perf.c:343:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str199[sizeof("timerfd_create")];
data/libseccomp-2.5.0/src/syscalls.perf.c:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str200[sizeof("getdents64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:345:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str201[sizeof("ftruncate")];
data/libseccomp-2.5.0/src/syscalls.perf.c:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str202[sizeof("mlockall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str203[sizeof("s390_pci_mmio_read")];
data/libseccomp-2.5.0/src/syscalls.perf.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str204[sizeof("s390_pci_mmio_write")];
data/libseccomp-2.5.0/src/syscalls.perf.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str205[sizeof("sendfile64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str206[sizeof("fchdir")];
data/libseccomp-2.5.0/src/syscalls.perf.c:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str207[sizeof("open_tree")];
data/libseccomp-2.5.0/src/syscalls.perf.c:352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str208[sizeof("setsockopt")];
data/libseccomp-2.5.0/src/syscalls.perf.c:353:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str209[sizeof("getsockopt")];
data/libseccomp-2.5.0/src/syscalls.perf.c:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str210[sizeof("move_mount")];
data/libseccomp-2.5.0/src/syscalls.perf.c:355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str211[sizeof("getpmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:356:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str212[sizeof("getcwd")];
data/libseccomp-2.5.0/src/syscalls.perf.c:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str213[sizeof("syslog")];
data/libseccomp-2.5.0/src/syscalls.perf.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str214[sizeof("mpx")];
data/libseccomp-2.5.0/src/syscalls.perf.c:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str215[sizeof("vm86old")];
data/libseccomp-2.5.0/src/syscalls.perf.c:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str216[sizeof("unlinkat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str217[sizeof("personality")];
data/libseccomp-2.5.0/src/syscalls.perf.c:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str218[sizeof("lseek")];
data/libseccomp-2.5.0/src/syscalls.perf.c:363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str219[sizeof("flock")];
data/libseccomp-2.5.0/src/syscalls.perf.c:364:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str220[sizeof("pivot_root")];
data/libseccomp-2.5.0/src/syscalls.perf.c:365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str221[sizeof("putpmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str222[sizeof("waitid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str223[sizeof("set_tls")];
data/libseccomp-2.5.0/src/syscalls.perf.c:368:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str224[sizeof("get_tls")];
data/libseccomp-2.5.0/src/syscalls.perf.c:369:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str225[sizeof("finit_module")];
data/libseccomp-2.5.0/src/syscalls.perf.c:370:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str226[sizeof("clock_getres")];
data/libseccomp-2.5.0/src/syscalls.perf.c:371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str227[sizeof("clock_settime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str228[sizeof("clock_gettime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str229[sizeof("ptrace")];
data/libseccomp-2.5.0/src/syscalls.perf.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str230[sizeof("readlinkat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str231[sizeof("kexec_file_load")];
data/libseccomp-2.5.0/src/syscalls.perf.c:376:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str232[sizeof("quotactl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str233[sizeof("olduname")];
data/libseccomp-2.5.0/src/syscalls.perf.c:378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str234[sizeof("shmdt")];
data/libseccomp-2.5.0/src/syscalls.perf.c:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str235[sizeof("perf_event_open")];
data/libseccomp-2.5.0/src/syscalls.perf.c:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str236[sizeof("settimeofday")];
data/libseccomp-2.5.0/src/syscalls.perf.c:381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str237[sizeof("gettimeofday")];
data/libseccomp-2.5.0/src/syscalls.perf.c:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str238[sizeof("sync_file_range")];
data/libseccomp-2.5.0/src/syscalls.perf.c:383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str239[sizeof("waitpid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str240[sizeof("inotify_init")];
data/libseccomp-2.5.0/src/syscalls.perf.c:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str241[sizeof("semget")];
data/libseccomp-2.5.0/src/syscalls.perf.c:386:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str242[sizeof("memfd_create")];
data/libseccomp-2.5.0/src/syscalls.perf.c:387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str243[sizeof("fanotify_init")];
data/libseccomp-2.5.0/src/syscalls.perf.c:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str244[sizeof("mq_open")];
data/libseccomp-2.5.0/src/syscalls.perf.c:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str245[sizeof("setgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:390:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str246[sizeof("getgid")];
data/libseccomp-2.5.0/src/syscalls.perf.c:391:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str247[sizeof("mbind")];
data/libseccomp-2.5.0/src/syscalls.perf.c:392:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str248[sizeof("inotify_init1")];
data/libseccomp-2.5.0/src/syscalls.perf.c:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str249[sizeof("fdatasync")];
data/libseccomp-2.5.0/src/syscalls.perf.c:394:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str250[sizeof("pipe2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:395:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str251[sizeof("semtimedop_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str252[sizeof("mmap")];
data/libseccomp-2.5.0/src/syscalls.perf.c:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str253[sizeof("subpage_prot")];
data/libseccomp-2.5.0/src/syscalls.perf.c:398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str254[sizeof("kexec_load")];
data/libseccomp-2.5.0/src/syscalls.perf.c:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str255[sizeof("clock_nanosleep")];
data/libseccomp-2.5.0/src/syscalls.perf.c:400:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str256[sizeof("shmctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str257[sizeof("umask")];
data/libseccomp-2.5.0/src/syscalls.perf.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str258[sizeof("restart_syscall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:403:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str259[sizeof("epoll_create")];
data/libseccomp-2.5.0/src/syscalls.perf.c:404:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str260[sizeof("readdir")];
data/libseccomp-2.5.0/src/syscalls.perf.c:405:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str261[sizeof("sched_setaffinity")];
data/libseccomp-2.5.0/src/syscalls.perf.c:406:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str262[sizeof("sched_getaffinity")];
data/libseccomp-2.5.0/src/syscalls.perf.c:407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str263[sizeof("sched_yield")];
data/libseccomp-2.5.0/src/syscalls.perf.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str264[sizeof("epoll_create1")];
data/libseccomp-2.5.0/src/syscalls.perf.c:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str265[sizeof("mlock")];
data/libseccomp-2.5.0/src/syscalls.perf.c:410:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str266[sizeof("s390_runtime_instr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str267[sizeof("fchown")];
data/libseccomp-2.5.0/src/syscalls.perf.c:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str268[sizeof("io_submit")];
data/libseccomp-2.5.0/src/syscalls.perf.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str269[sizeof("getpgrp")];
data/libseccomp-2.5.0/src/syscalls.perf.c:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str270[sizeof("sigaction")];
data/libseccomp-2.5.0/src/syscalls.perf.c:415:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str271[sizeof("madvise")];
data/libseccomp-2.5.0/src/syscalls.perf.c:416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str272[sizeof("mq_timedsend")];
data/libseccomp-2.5.0/src/syscalls.perf.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str273[sizeof("getegid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:418:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str274[sizeof("geteuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str275[sizeof("getpeername")];
data/libseccomp-2.5.0/src/syscalls.perf.c:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str276[sizeof("ssetmask")];
data/libseccomp-2.5.0/src/syscalls.perf.c:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str277[sizeof("sgetmask")];
data/libseccomp-2.5.0/src/syscalls.perf.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str278[sizeof("lchown")];
data/libseccomp-2.5.0/src/syscalls.perf.c:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str279[sizeof("fchownat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str280[sizeof("chmod")];
data/libseccomp-2.5.0/src/syscalls.perf.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str281[sizeof("timer_create")];
data/libseccomp-2.5.0/src/syscalls.perf.c:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str282[sizeof("capget")];
data/libseccomp-2.5.0/src/syscalls.perf.c:427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str283[sizeof("sysinfo")];
data/libseccomp-2.5.0/src/syscalls.perf.c:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str284[sizeof("msgget")];
data/libseccomp-2.5.0/src/syscalls.perf.c:429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str285[sizeof("nfsservctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str286[sizeof("flistxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str287[sizeof("_llseek")];
data/libseccomp-2.5.0/src/syscalls.perf.c:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str288[sizeof("rt_sigqueueinfo")];
data/libseccomp-2.5.0/src/syscalls.perf.c:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str289[sizeof("rt_tgsigqueueinfo")];
data/libseccomp-2.5.0/src/syscalls.perf.c:434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str290[sizeof("sched_get_priority_max")];
data/libseccomp-2.5.0/src/syscalls.perf.c:435:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str291[sizeof("io_destroy")];
data/libseccomp-2.5.0/src/syscalls.perf.c:436:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str292[sizeof("write")];
data/libseccomp-2.5.0/src/syscalls.perf.c:437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str293[sizeof("llistxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:438:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str294[sizeof("munlockall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str295[sizeof("set_tid_address")];
data/libseccomp-2.5.0/src/syscalls.perf.c:440:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str296[sizeof("creat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:441:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str297[sizeof("pkey_alloc")];
data/libseccomp-2.5.0/src/syscalls.perf.c:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str298[sizeof("_newselect")];
data/libseccomp-2.5.0/src/syscalls.perf.c:443:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str299[sizeof("pkey_free")];
data/libseccomp-2.5.0/src/syscalls.perf.c:444:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str300[sizeof("openat2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str301[sizeof("arch_prctl")];
data/libseccomp-2.5.0/src/syscalls.perf.c:446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str302[sizeof("chroot")];
data/libseccomp-2.5.0/src/syscalls.perf.c:447:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str303[sizeof("kcmp")];
data/libseccomp-2.5.0/src/syscalls.perf.c:448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str304[sizeof("unlink")];
data/libseccomp-2.5.0/src/syscalls.perf.c:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str305[sizeof("cacheflush")];
data/libseccomp-2.5.0/src/syscalls.perf.c:450:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str306[sizeof("riscv_flush_icache")];
data/libseccomp-2.5.0/src/syscalls.perf.c:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str307[sizeof("setitimer")];
data/libseccomp-2.5.0/src/syscalls.perf.c:452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str308[sizeof("getitimer")];
data/libseccomp-2.5.0/src/syscalls.perf.c:453:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str309[sizeof("rename")];
data/libseccomp-2.5.0/src/syscalls.perf.c:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str310[sizeof("execve")];
data/libseccomp-2.5.0/src/syscalls.perf.c:455:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str311[sizeof("rt_sigtimedwait_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:456:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str312[sizeof("clock_adjtime")];
data/libseccomp-2.5.0/src/syscalls.perf.c:457:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str313[sizeof("rseq")];
data/libseccomp-2.5.0/src/syscalls.perf.c:458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str314[sizeof("spu_run")];
data/libseccomp-2.5.0/src/syscalls.perf.c:459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str315[sizeof("sigaltstack")];
data/libseccomp-2.5.0/src/syscalls.perf.c:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str316[sizeof("timer_settime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str317[sizeof("timer_gettime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str318[sizeof("timerfd_settime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str319[sizeof("timerfd_gettime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str320[sizeof("rt_sigprocmask")];
data/libseccomp-2.5.0/src/syscalls.perf.c:465:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str321[sizeof("readlink")];
data/libseccomp-2.5.0/src/syscalls.perf.c:466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str322[sizeof("renameat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str323[sizeof("execveat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str324[sizeof("mkdirat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:469:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str325[sizeof("symlinkat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str326[sizeof("setxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str327[sizeof("getxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str328[sizeof("fspick")];
data/libseccomp-2.5.0/src/syscalls.perf.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str329[sizeof("io_uring_setup")];
data/libseccomp-2.5.0/src/syscalls.perf.c:474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str330[sizeof("stat64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:475:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str331[sizeof("truncate64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:476:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str332[sizeof("io_pgetevents")];
data/libseccomp-2.5.0/src/syscalls.perf.c:477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str333[sizeof("multiplexer")];
data/libseccomp-2.5.0/src/syscalls.perf.c:478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str334[sizeof("statx")];
data/libseccomp-2.5.0/src/syscalls.perf.c:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str335[sizeof("pselect6_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str336[sizeof("futex")];
data/libseccomp-2.5.0/src/syscalls.perf.c:481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str337[sizeof("recvmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str338[sizeof("vfork")];
data/libseccomp-2.5.0/src/syscalls.perf.c:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str339[sizeof("sched_rr_get_interval")];
data/libseccomp-2.5.0/src/syscalls.perf.c:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str340[sizeof("statfs64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:485:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str341[sizeof("fanotify_mark")];
data/libseccomp-2.5.0/src/syscalls.perf.c:486:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str342[sizeof("readahead")];
data/libseccomp-2.5.0/src/syscalls.perf.c:487:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str343[sizeof("readv")];
data/libseccomp-2.5.0/src/syscalls.perf.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str344[sizeof("msgrcv")];
data/libseccomp-2.5.0/src/syscalls.perf.c:489:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str345[sizeof("ppoll_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:490:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str346[sizeof("sync_file_range2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str347[sizeof("membarrier")];
data/libseccomp-2.5.0/src/syscalls.perf.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str348[sizeof("epoll_wait")];
data/libseccomp-2.5.0/src/syscalls.perf.c:493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str349[sizeof("mq_timedreceive")];
data/libseccomp-2.5.0/src/syscalls.perf.c:494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str350[sizeof("brk")];
data/libseccomp-2.5.0/src/syscalls.perf.c:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str351[sizeof("epoll_wait_old")];
data/libseccomp-2.5.0/src/syscalls.perf.c:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str352[sizeof("ftruncate64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str353[sizeof("fsetxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str354[sizeof("fgetxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str355[sizeof("spu_create")];
data/libseccomp-2.5.0/src/syscalls.perf.c:500:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str356[sizeof("remap_file_pages")];
data/libseccomp-2.5.0/src/syscalls.perf.c:501:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str357[sizeof("exit_group")];
data/libseccomp-2.5.0/src/syscalls.perf.c:502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str358[sizeof("epoll_pwait")];
data/libseccomp-2.5.0/src/syscalls.perf.c:503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str359[sizeof("setgroups")];
data/libseccomp-2.5.0/src/syscalls.perf.c:504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str360[sizeof("getgroups")];
data/libseccomp-2.5.0/src/syscalls.perf.c:505:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str361[sizeof("munlock")];
data/libseccomp-2.5.0/src/syscalls.perf.c:506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str362[sizeof("lsetxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str363[sizeof("lgetxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:508:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str364[sizeof("rmdir")];
data/libseccomp-2.5.0/src/syscalls.perf.c:509:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str365[sizeof("listxattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:510:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str366[sizeof("signalfd4")];
data/libseccomp-2.5.0/src/syscalls.perf.c:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str367[sizeof("pkey_mprotect")];
data/libseccomp-2.5.0/src/syscalls.perf.c:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str368[sizeof("modify_ldt")];
data/libseccomp-2.5.0/src/syscalls.perf.c:513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str369[sizeof("accept4")];
data/libseccomp-2.5.0/src/syscalls.perf.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str370[sizeof("clock_settime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:515:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str371[sizeof("clock_gettime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:516:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str372[sizeof("fcntl64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str373[sizeof("clock_getres_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str374[sizeof("recvmmsg")];
data/libseccomp-2.5.0/src/syscalls.perf.c:519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str375[sizeof("mkdir")];
data/libseccomp-2.5.0/src/syscalls.perf.c:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str376[sizeof("usr32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str377[sizeof("swapoff")];
data/libseccomp-2.5.0/src/syscalls.perf.c:522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str378[sizeof("mlock2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str379[sizeof("vmsplice")];
data/libseccomp-2.5.0/src/syscalls.perf.c:524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str380[sizeof("setuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str381[sizeof("getuid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str382[sizeof("swapon")];
data/libseccomp-2.5.0/src/syscalls.perf.c:527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str383[sizeof("name_to_handle_at")];
data/libseccomp-2.5.0/src/syscalls.perf.c:528:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str384[sizeof("eventfd2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:529:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str385[sizeof("clock_nanosleep_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str386[sizeof("io_uring_enter")];
data/libseccomp-2.5.0/src/syscalls.perf.c:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str387[sizeof("io_uring_register")];
data/libseccomp-2.5.0/src/syscalls.perf.c:532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str388[sizeof("uselib")];
data/libseccomp-2.5.0/src/syscalls.perf.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str389[sizeof("adjtimex")];
data/libseccomp-2.5.0/src/syscalls.perf.c:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str390[sizeof("shmat")];
data/libseccomp-2.5.0/src/syscalls.perf.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str391[sizeof("io_getevents")];
data/libseccomp-2.5.0/src/syscalls.perf.c:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str392[sizeof("symlink")];
data/libseccomp-2.5.0/src/syscalls.perf.c:537:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str393[sizeof("vhangup")];
data/libseccomp-2.5.0/src/syscalls.perf.c:538:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str394[sizeof("recv")];
data/libseccomp-2.5.0/src/syscalls.perf.c:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str395[sizeof("get_kernel_syms")];
data/libseccomp-2.5.0/src/syscalls.perf.c:540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str396[sizeof("afs_syscall")];
data/libseccomp-2.5.0/src/syscalls.perf.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str397[sizeof("umount2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str398[sizeof("mq_timedsend_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:543:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str399[sizeof("process_vm_readv")];
data/libseccomp-2.5.0/src/syscalls.perf.c:544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str400[sizeof("process_vm_writev")];
data/libseccomp-2.5.0/src/syscalls.perf.c:545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str401[sizeof("create_module")];
data/libseccomp-2.5.0/src/syscalls.perf.c:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str402[sizeof("vserver")];
data/libseccomp-2.5.0/src/syscalls.perf.c:547:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str403[sizeof("swapcontext")];
data/libseccomp-2.5.0/src/syscalls.perf.c:548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str404[sizeof("query_module")];
data/libseccomp-2.5.0/src/syscalls.perf.c:549:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str405[sizeof("chown")];
data/libseccomp-2.5.0/src/syscalls.perf.c:550:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str406[sizeof("futex_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str407[sizeof("clock_adjtime64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str408[sizeof("shmget")];
data/libseccomp-2.5.0/src/syscalls.perf.c:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str409[sizeof("sigprocmask")];
data/libseccomp-2.5.0/src/syscalls.perf.c:554:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str410[sizeof("s390_sthyi")];
data/libseccomp-2.5.0/src/syscalls.perf.c:555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str411[sizeof("inotify_add_watch")];
data/libseccomp-2.5.0/src/syscalls.perf.c:556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str412[sizeof("mmap2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str413[sizeof("setgroups32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str414[sizeof("getgroups32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:559:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str415[sizeof("shutdown")];
data/libseccomp-2.5.0/src/syscalls.perf.c:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str416[sizeof("set_mempolicy")];
data/libseccomp-2.5.0/src/syscalls.perf.c:561:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str417[sizeof("get_mempolicy")];
data/libseccomp-2.5.0/src/syscalls.perf.c:562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str418[sizeof("recvfrom")];
data/libseccomp-2.5.0/src/syscalls.perf.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str419[sizeof("sched_rr_get_interval_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str420[sizeof("io_pgetevents_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str421[sizeof("setgid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:566:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str422[sizeof("getgid32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:567:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str423[sizeof("removexattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str424[sizeof("set_robust_list")];
data/libseccomp-2.5.0/src/syscalls.perf.c:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str425[sizeof("get_robust_list")];
data/libseccomp-2.5.0/src/syscalls.perf.c:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str426[sizeof("chdir")];
data/libseccomp-2.5.0/src/syscalls.perf.c:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str427[sizeof("setpriority")];
data/libseccomp-2.5.0/src/syscalls.perf.c:572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str428[sizeof("getpriority")];
data/libseccomp-2.5.0/src/syscalls.perf.c:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str429[sizeof("mq_timedreceive_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str430[sizeof("fstat64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:575:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str431[sizeof("fremovexattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str432[sizeof("fchown32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str433[sizeof("security")];
data/libseccomp-2.5.0/src/syscalls.perf.c:578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str434[sizeof("lstat64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str435[sizeof("fstatfs64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str436[sizeof("lremovexattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str437[sizeof("lchown32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:582:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str438[sizeof("wait4")];
data/libseccomp-2.5.0/src/syscalls.perf.c:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str439[sizeof("fstatat64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:584:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str440[sizeof("mq_getsetattr")];
data/libseccomp-2.5.0/src/syscalls.perf.c:585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str441[sizeof("preadv")];
data/libseccomp-2.5.0/src/syscalls.perf.c:586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str442[sizeof("request_key")];
data/libseccomp-2.5.0/src/syscalls.perf.c:587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str443[sizeof("inotify_rm_watch")];
data/libseccomp-2.5.0/src/syscalls.perf.c:588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str444[sizeof("sys_debug_setcontext")];
data/libseccomp-2.5.0/src/syscalls.perf.c:589:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str445[sizeof("mq_notify")];
data/libseccomp-2.5.0/src/syscalls.perf.c:590:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str446[sizeof("set_thread_area")];
data/libseccomp-2.5.0/src/syscalls.perf.c:591:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str447[sizeof("get_thread_area")];
data/libseccomp-2.5.0/src/syscalls.perf.c:592:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str448[sizeof("arm_sync_file_range")];
data/libseccomp-2.5.0/src/syscalls.perf.c:593:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str449[sizeof("writev")];
data/libseccomp-2.5.0/src/syscalls.perf.c:594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str450[sizeof("renameat2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str451[sizeof("switch_endian")];
data/libseccomp-2.5.0/src/syscalls.perf.c:596:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str452[sizeof("fadvise64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str453[sizeof("prlimit64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:598:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str454[sizeof("fadvise64_64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:599:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str455[sizeof("pwritev")];
data/libseccomp-2.5.0/src/syscalls.perf.c:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str456[sizeof("mq_unlink")];
data/libseccomp-2.5.0/src/syscalls.perf.c:601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str457[sizeof("breakpoint")];
data/libseccomp-2.5.0/src/syscalls.perf.c:602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str458[sizeof("pread64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str459[sizeof("recvmmsg_time64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str460[sizeof("arm_fadvise64_64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:605:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str461[sizeof("add_key")];
data/libseccomp-2.5.0/src/syscalls.perf.c:606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str462[sizeof("pwrite64")];
data/libseccomp-2.5.0/src/syscalls.perf.c:607:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str463[sizeof("preadv2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:608:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str464[sizeof("break")];
data/libseccomp-2.5.0/src/syscalls.perf.c:609:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str465[sizeof("pwritev2")];
data/libseccomp-2.5.0/src/syscalls.perf.c:610:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str466[sizeof("bdflush")];
data/libseccomp-2.5.0/src/syscalls.perf.c:611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str467[sizeof("chown32")];
data/libseccomp-2.5.0/src/syscalls.perf.c:612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringpool_str468[sizeof("open_by_handle_at")];
data/libseccomp-2.5.0/tests/21-live-basic_allow.c:48:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 0);
data/libseccomp-2.5.0/tests/24-live-arg_allow.c:51:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/null", O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR);
data/libseccomp-2.5.0/tests/32-live-tsync_allow.c:52:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 0);
data/libseccomp-2.5.0/tests/38-basic-pfc_coverage.c:65:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(open), 0);
data/libseccomp-2.5.0/tests/44-live-a2_order.c:70:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	zero_fd = open("/dev/zero", O_RDONLY);
data/libseccomp-2.5.0/tests/44-live-a2_order.c:152:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 0);
data/libseccomp-2.5.0/tests/46-sim-kill_process.c:62:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = seccomp_rule_add(ctx, SCMP_ACT_KILL_THREAD, SCMP_SYS(open), 0);
data/libseccomp-2.5.0/tests/47-live-kill_process.c:59:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/null", O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR);
data/libseccomp-2.5.0/tests/53-sim-binary_tree.c:48:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	{ SCMP_SYS(open), 2, 0, { 0, 0 } },
data/libseccomp-2.5.0/tests/54-live-binary_tree.c:80:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/null", O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR);
data/libseccomp-2.5.0/tests/55-basic-pfc_binary_tree.c:48:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	{ SCMP_SYS(open), 2, 0, { 0, 0 } },
data/libseccomp-2.5.0/tests/util.c:201:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR);
data/libseccomp-2.5.0/tools/scmp_bpf_disasm.c:527:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(argv[opt_file], "r");
data/libseccomp-2.5.0/tools/scmp_bpf_sim.c:349:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(opt_file, "r");
data/libseccomp-2.5.0/tools/scmp_sys_resolver.c:83:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sys_num = atoi(argv[optind]);
data/libseccomp-2.5.0/src/arch-syscall-check.c:57:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(str_miss, ",");
data/libseccomp-2.5.0/src/syscalls.perf.c:3476:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = in_word_set(name, strlen(name));
data/libseccomp-2.5.0/tests/02-sim-basic.c:48:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/03-sim-basic_chains.c:43:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/04-sim-multilevel_chains.c:52:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 3,
data/libseccomp-2.5.0/tests/06-sim-actions.c:47:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/07-sim-db_bug_looping.c:46:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/07-sim-db_bug_looping.c:51:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/07-sim-db_bug_looping.c:56:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:55:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_syscall_priority(ctx, SCMP_SYS(read), 1);
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:71:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:80:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:83:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_KILL - 1, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:86:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 7);
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:89:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 7,
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:99:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/11-basic-basic_errors.c:103:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/14-sim-reset.c:43:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/16-sim-arch_basic.c:99:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/17-sim-arch_merge.c:64:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx_32, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/18-sim-basic_allowlist.c:43:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/22-sim-basic_chains_array.c:45:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					  SCMP_SYS(read), 1, &arg_cmp);
data/libseccomp-2.5.0/tests/23-sim-arch_all_le_basic.c:78:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/24-live-arg_allow.c:39:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssize_t buf_len = strlen(buf);
data/libseccomp-2.5.0/tests/26-sim-arch_all_be_basic.c:74:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/34-sim-basic_denylist.c:43:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add_exact(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/38-basic-pfc_coverage.c:68:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_KILL, SCMP_SYS(read), 4,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:47:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:51:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(5), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:55:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(6), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:59:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(7), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:63:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(8), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:67:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(9), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:71:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(10), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:75:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(11), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/43-sim-a2_order.c:79:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(12), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:78:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(zero_fd, buf, sz);
data/libseccomp-2.5.0/tests/44-live-a2_order.c:104:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:108:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(5), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:112:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(6), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:116:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(7), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:120:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(8), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:124:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(9), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:128:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(10), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:132:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(11), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/44-live-a2_order.c:136:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ERRNO(12), SCMP_SYS(read), 1,
data/libseccomp-2.5.0/tests/46-sim-kill_process.c:54:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
data/libseccomp-2.5.0/tests/53-sim-binary_tree.c:46:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	{ SCMP_SYS(read), 0, 0, { 0, 0 } },
data/libseccomp-2.5.0/tests/54-live-binary_tree.c:68:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssize_t buf_len = strlen(buf);
data/libseccomp-2.5.0/tests/55-basic-pfc_binary_tree.c:46:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	{ SCMP_SYS(read), 0, 2, { 100, 101 } },
data/libseccomp-2.5.0/tests/util.c:199:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssize_t buf_len = strlen(buf);

ANALYSIS SUMMARY:

Hits = 551
Lines analyzed = 26091 in approximately 0.70 seconds (37215 lines/second)
Physical Source Lines of Code (SLOC) = 17623
Hits@level = [0] 162 [1]  51 [2] 490 [3]   6 [4]   4 [5]   0
Hits@level+ = [0+] 713 [1+] 551 [2+] 500 [3+]  10 [4+]   4 [5+]   0
Hits/KSLOC@level+ = [0+] 40.4585 [1+] 31.266 [2+] 28.372 [3+] 0.56744 [4+] 0.226976 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.